TrustRadius
Austin-based company Forcepoint (formerly Websense) offers Forcepoint Web Security, a cloud security platform.https://media.trustradius.com/product-logos/Fs/Q1/8A2PACKTX2QK.JPEGForcepoint Web Security in HealthcareWe use it across the entire company. All web traffic is routed to our datacenter and the ForcePoint appliance is positioned to monitor all traffic. It was selected for security, compliance and to help manage productivity. The filtering and blocking functionality has provided excellent security as well as providing a method of managing personal web browsing.,Security: The security functionality is built in and does nto require any tuning or intervention. Compliance and Governance; The web filtering policies allow us to implement policies and procedures easily. It is very easy to block things like pornography and hate speech. Productivity: We frequently create custom policies for specific groups or individuals when we suspect the are spending too much time on their browsers for nonbusiness-related activities.,The easiest way to set an exclusion is in a list. Unfortunately, the list is limited to 500 lines. The initial setup with the appliances and hybrid services are difficult to understand. Upgrading the system is complicated due to the distributed nature of the system with servers and appliances. I upgraded something out of order and spent a few days on the phone with tech support to fix it.,8,It is actually a hard question to answer. As part of broader security infrastructure, it has performed well in its intended role. We have not suffered any significant breaches since it was installed. However, it is difficult to ascribe this solely to the Forcepoint Web Security. For instance, we also use the Umbrella DNS servers and they may prevent users from accessing malicious websites as well. Forcepoint provides flexibility where the DNS servers do not.,As a Healthcare entity, we utilize the Cisco AnyConnect Secure Mobility Client VPN for all roaming and remote users. All traffic is routed back to our datacenter and is processed by the ForcePoint Web Security appliance. We have not made any use of the extended security features at this time. We are looking into more resiliency in our network and these features will be reviewed in the near future.,We currently do not use any of the CASB features.,One of the features that initially attracted me to the ForcePoint Web Security platform was the use of deep content inspection and the Advanced Classification Engine. As threats evolve and become more sophisticated this type of deep inspection and analysis becomes critical to security. We are seeing advances in the sophistication of malware on a daily basis. Polymorphic threats require the use of an Advanced Classification Engine (ACE) to identify and protect against modern threats.,As a Healthcare provider, we also use the email and DLP products for regulatory compliance. email and DLP have provided security protection as well as advanced encryption and Data Loss Prevention. The DLP solution can be customized to do advance fingerprinting. This function uses actual data from our patient census to scan all emails for ePHI. As a provider, there is a huge volume of legitimate ePHI in emails. Forcepoint provides an easy way to monitor and manage this.,Forcepoint Web Security is better than the competition thinks.Currently Forcepoint Web Security is used to monitor and protect 50,000 users for a large state agency. This is used to keep our employees protected from emerging threats as well as controlling non business related web requests filtered to ensure safety and compliance.,Very good filtering and deep packet inspection for SSL ICAP support for Data Loss Prevention Protection of Web email Channels for loss.,Complex Management require full time Better license model, too much like Cisco with multi licenses.,9,Business productivity increased due to lessening "play" time on the internet Better security posture with Forcepoint.,We leverage the Forcepoint cloud and endpoint to filter both onsite and remote users. This allows users to get the same policy when traveling or remote without having to be connected to a VPN constantly.,Threat detection has gone up over 20% with Forcepoint ACE since it was deployed over Cisco Web Security.,Cisco IronPort Web Security ApplianceForcepoint Web Security used on a daily basisWithin our company, we use Forcepoint Web Security as part of our total online security strategy. It is used in our entire EMEAR-wide organization. All of our main user internet traffic is proxied through the Forcepoint Web Security program. Forcepoint Web security is used as an SSL inspecting proxy, scanning all traffic (inbound and outbound) for malicious content. The main advantage for our environment is the granular delegation of its administration which is assigned via the active directory. We allow local departments to implement their own rule sets besides the mandatory rule set which is dictated at a corporate level.,Delegated administration. Single management interface for web, data and email security. Cloud integration.,New products are sometimes released to market before they are fully evaluated. The first implementation requires a lot of attention, especially the sizing of the platform, but once it's all set up its smooth sailing.,10,Forcepoint Web Security requires investment in purchase and time spent to gain knowledge on how to implement and manage the product. We cannot say for sure how much is saved, but in the reports, we see that a lot of malicious content is blocked and that access to non-business related sites is restricted where it is needed.,It this moment we are in the process of implementing Forcepoint Web Security for our roaming users. This will also incorporate the use of the proxy agent for all our users since we are moving towards a local break out for our office instead of the central break out we currently have. The agent is just another tool to provide even more security in more situations.,We are currently implementing the full CASB solution, we are mainly focused on preventing unwanted sharing of corporate information through Office 365. We use it the revoke sharing rights for classified documents.,In our organization, we see that the ACE has intercepted malicious content, and in doing so preventing our organization from possible loss of data and reputation damage.,We are using web Security, DLP, email Security and CASB. It is very nice to have one management interface for all solutions. Currently, CASB is still in a separate management console, but it’s very intuitive. By using web, DLP and email security from one console, we can share the ruleset and classification between the different products. This is a real benefit,,3500,10,We have basically one main use case: Protect internet access for our users.,None that i'm aware of currently.,We would like to extend the implementation of DLP.,10,Microsoft Azure, Microsoft Office 365A solid product for Web SecurityWe used Forcepoint Web Security Cloud for our entire organization. The setup was essentially a proxy server in the cloud (previously we used a Websense/Forcepoint proxy appliance onsite). All web browsing from users' laptops were filtered in the cloud. This added a nice layer to our layers of defense strategy.,Reporting was excellent. You could run a variety of canned reports or create your own. You could easily group users and apply different web filtering policies. Was cloud hosted so there was no onsite equipment to maintain. Only end-user software installs.,Despite having excellent reporting, I could never get a report that tells me what the user either entered or clicked on. It was always tons of data/links that load with every page. So it's very difficult to see what a user did. Not sure any web filtering software can do this. The endpoint software install / uninstall was a bit challenging. It gets it's hooks in at the network level, so it drops the connection during installs. Didn't filter all traffic on our network. Maybe this was another component they have, but our installation was at the endpoint level. This left plenty of other devices to connect to whatever they wanted unfiltered. Had to create exceptions to bypass the proxy server for various applications. This is ok for a few things, but it got to be ridiculous. So many things were bypassing the proxy server that it felt like swiss cheese security.,8,As a layer of our defense strategy, I think Forcepoint played a critical part. We didn't have any major malware issues while using it. It kept our users out of bad/unwanted sites. Gave big brother data to management via reports.,Using the cloud proxy with the endpoint install, all data was sent to the proxy in the cloud for filtering. This was a great move for remote/traveling users. They no longer needed to VPN back to the main network to access the web.,Don't believe we really utilized this.,This was a nice feature. If a site/page wasn't blocked, it would still analyze all of the links/content on the page for threats. Not sure if this prevented anything or slowed down browsing, but it was nice.,We did not extend the product with any of these integrations.,Webroot DNS ProtectionForcepoint Web Security is a good flexible tool to protect your user community.Forcepoint Web Security is being used throughout our entire organization. It is used to provide web content filtering that follows our Compliance, HR, Information Security, and Legal policies. In addition, it provides our users a layer of protection from malicious web content that is updated multiple times a day. This is very important in today's electronic communication environment where users are getting bombarded with very realistic looking SPAM and malicious e-mails that want users to "Click on this link" to....,Prevent access to suspicious or malicious web sites. Keep their database of malicious or suspicions web sites current. Allows us to customize/fine tune user access to sites. We can allow some people to access sites while preventing other from accessing those sites.,The support when I call in could be better. When I call in with a high priority issue, I have to wait while the agent tries to reach the technician that works on my account. If they are not available then I need to leave information for the technician. This is no better than me opening a ticket from within their customer portal. Some of their upgrade documentation could be more detailed and kept up to date.,9,The tool supports our code of conduct policy. It supports our acceptable use policy.,We have a hybrid configuration so our remote users are able to connect to the internet AND still comply with our acceptable use policy. This is used by any of our users that have laptops such a field sales people and remote users.This helps protect our users and their devices from the potential to go to malicious and prohibited content.,We are in the process of evaluating implementing a CASB solution so I am not able to comment on the effectiveness of Forcepoint's offering.,We appreciate having the Advanced Classification Engine. In today's electronic landscape, as many tools to safeguard our users is a good thing.There are better alternatives in the current marketForcepoint Web Security, Formerly Websense(used to be called WSG), is Forcepoint's solution for Web Proxy. This is currently our Proxy solution in the company. We have hybrid deployment - meaning we have an agent on all of our endpoints to make sure that even when using outside the network, the web access will be controlled. When using in the office, we have on-prem local proxies. The policies allow one to control access to categories/protocols. You can allow, block or limit and also control the ability to download files. There is also a built-in AV, which in my opinion doesn't do much. The new feature of Shadow IT can help you detect the usage of Shadow IT in your network.,The ability to set policies is very simple. Logging and monitoring are detailed and easy to run. Deploying new proxies are now much more simple with the proxy appliances. In the past, you had to install the OS and software.,From time to time services stop working, so you need to manually restart them. Endpoint agents can cause problems in all kind of situations such as during a flight, hotel wifi, if the user is in China, some ISP's, etc. Some settings cannot be changed from the management server and you'll need to do them on each proxy server manually. Support in O365 apps does not always work and can cause issues. We had to configure some bypasses in order to solve them.,6,All the components can be virtual - no need to purchase any physical appliance. From what I had a chance to see, Forcepoint prices are very competitive (in comparison to other proxy vendors). I spent (or actually wasted) a lot of time with their support when I had problems with the system. This can be very frustrating.,You can purchase the Hybrid module for remote users. This will require you to deploy agents on all relevant users. There are 2 types of agents - one called Proxy Connect and the other Direct Connect. We use both of them. Proxy Connect is the inline proxy with all the proxy capabilities and features. But can cause all kind of issues. The Direct Connect agents were designed to solve these problems, BUT- this agent only does URL filtering which is less secure.,The built in feature can help you detect Shadow IT usage in your network. This is not a full CASB solution! It's nice to have if your policy is very loose. We used it to adjust our policy and blocked some services. I noticed some false positives where the detection was not correct.,Forcepoint has real-time detection of websites. This is in case the URL is allowed but malicious content is found. Theoretically it is a very good feature, but in reality, it sometimes gives false positives.,We POCed the CASB solution. Forcepoint acquired SkyFence, which is their CASB today. I expected it work much more smoothly than it does. But it still looks like the solution is not integrated enough (like working with two different companies). Eventually, we moved to MS.,Symantec Web Security.cloudForcepoint offers one of the best web security solutions on the market today.We use FP Web Security at the whole organization, it provides a high level of security in the web browsing of users, decreasing the number of computers infected by malicious software, in addition to providing controlled access to resources that users require. It also helps us to comply with regulations regarding the protection of information from our customers and users.,It has a very good level of detection of malicious software which helps our equipment to remain protected. It has very accurate DLP detection engines that help facilitate the implementation of this type of policy. Realizes a categorization of the websites in a very adequate and fast way, allowing you to manage the access to multiple categories of sites for each user or group of users. It has multiple forms of administration of web access, based on schedules, available bandwidth, whether the user is in the corporate network or not, etc.,Improve or enable the DLP integration for the cloud solution in a more transparent way. Add integration options with MDM providers for filtering on mobile devices.,10,In a short period of time it is reflected positively by increasing the available time of the security team. It can also be reflected in the time users spend surfing the Internet on sites not related to work.,Our users are protected against web threats inside and outside the company, using a Forcepoint services installed on-site equipment such as those located in the cloud, which are used when our users are outside the network in such a way that the protection and filtering of the solution accompany our users wherever they go.,The part of Shadow IT allows us to obtain reports that inform us of the cloud apps that our users are using both those supported by the company and others that do not, also allows us to easily block access to those cloud apps that are considered high risk and/or allow the use only of those that the company officially supports.,These advanced security capabilities (ACE) have allowed the decrease of the number of computers that are infected by malicious software by blocking the access of browsers/users to the pages where they reside, in addition, these detection capabilities have allowed us to have no case of information encrypted by external attackers to date.,We have other Forcepoint solutions which allow, for example, that the emails we receive are analyzed including the links they contain, even these links are analyzed in real time when a user clicks on one of them which has prevented last-minute infections in our equipment. Another module that we use is AMD, which performs an advanced sandbox analysis that reviews all the files that arrive via both Web and Mail against all types of threats.,Forcepoint Web Security reviewForcepoint is used for two purposes. First, to scan all emails inbound and outbound for malware and spam, etc. Second, all web traffic is scanned after having passed through a squid proxy server. The primary objective is to stop malware in emails from entering the organization and stop malicious websites.,The control panel is good and the email search functionality is very good, note the default storage time for email history is 30 days. You can have multiple profiles for different departments: one department needs more access to social media than other departments, for example. Whitelist functionality is easy to access.,You cannot add whitelists to allow known organizations who send encrypted emails through without catching them all. Sometimes the email history systems falls behind the actual filtering so you cannot review an email although you have been warned about it. We have had some occasions when Forcepoint has been blacklisted with some internet systems.,9,The price was very competitive with alternative products we investigated. Having an extra level of security for web browsing has allowed more relaxed settings for some departments. Social media access can be controlled so users use the social media for business purposes when appropriate.,We do not use Forcepoint on roaming and external users by design and use Windows Defender for external users, whose devices contain no corporate data.,Our organization found some shadow IT with this feature, it does what it says on the tin. We are able to investigate and sort out the problem based on the Forcepoint reporting information. If you are concerned by this problem, Forcpeoint can help track down the shadow and cloud apps.,We have definitely benefitted from this feature. However, it can be too good! Sometimes emails are correctly blocked because the customer's/supplier's web site, which is on a link in the email, has been hacked and we have been able to inform the customer of the problem and they can fix their website.,We are planning to extend the product in the near future with cloud sandboxing in an attempt to remove the most complex malware without having to invest in on-premises equipment.,Forcepoint Web Security - Our go to WebFiltering platformWe have been using Forcepoint Web Security for 3 years now. We have used WebFiltering systems since we started in 2006. Our first experience was with SurfControl which was acquired by Websense which was acquired by Forcepoint. We are not new to this. We use Forcepoint Web Security across our entire organization as part of our Forcepoint suite (we also have Forcepoint Email Security). We have always tried to help users with this massive spam problem that everyone has and we use it to monitor and protect our users from going to unwanted websites and non productive sites.,Protects users from non productive sites so they can focus on work Protects users from unwillingly entering unwanted sites like pornography and malicious content sites Allows us to deploy internet access per groups with particular categories that fit their job functions,Setting it up can be complicated. Not for low level IT people with less experience. Forcepoint Support can improve. Slow response times and usually they think that the user has a high level IT background. Forcepoint core updates are used in marketing campaigns but when you call support they recommend not updating to a higher version because of problems and bugs. Why market new improvements and new features if they do not work?,9,ROI is troublesome to analyze. The software is expensive and you can't really put a dollar amount on users' internet activity. Like I mentioned before, configuration is the key. One main issue we have is users not having correct internet use policies. We only handle about 800 users, can't imagine thousands.,We are currently not using this feature.,We are currently not using this feature.,We have seen some ACE but it is not our day to day tool. It is a great tool but we are not utilizing its full potential yet.,We currently use Web Security but have not enabled DLP. We do use it on our Email Security part.,Fortinet FortiGateBrevity and HonestyForcepoint is used organisation wide as a cloud based reverse proxy. It resolves productivity and threat based issues with users' machines. Due to the implementation of Forcepoint we have a much better understanding of users' browsing behaviour and are better able to respond to web based threats if a user clicks on a malicious link.,Good categorisation Excellent customer support Easy to use Reasonable pricing,No limit to URLs More industry wide collaboration is needed not just from Forcepoint but all vendors of similar products in this space,9,It manages all users' web access and prevents undesirable sites from being loaded It enables micro management of users' permissions to achieve departmental requirements Allows admins to block potential threats before a user clicks,Field staff and users outside of our main office all have the endpoint installed and they have an identical web experience to users in the office.,We have not been able to utilise CASB as yet.,Definitely - we use ACE insight on a daily basis as it allows us to contribute to the overall security of all Forcepoint users. This almost creates an information sharing platform for security professionals.,not extended - no comment,Forcepoint: Great ProductThis is our primary web filter and works great. We used this to replace the Websense software we had before. At this point, it has worked great and we have had no issues.,Block inappropriate sites Block malicious sites Blocks unwanted ads,Currently have a problem with endpoints updating properly,8,Nothing negative, the positive is keeping us from viruses,Very beneficial when blocking viruses.,Nice monitoring and restrictions of unwanted sites.,We have experienced blocks that have kept us from very costly infections.,Currently do not use any extended products.,It’s brilliant!We use ForcePoint cloud-based email and web security software to filter mail and provide web proxy filtering. All incoming and outgoing mail passes through the filter and all user web traffic is filtered by the cloud proxy.,Single pane of glass for email and web security Excellent customer service Clear help articles,The support portal is outdated.,10,Unable to comment,The ability to filter end-user web traffic no matter where they are has been a great selling point.,Have not used this part of the product.,We have not had a security breach so the DPI, etc. is doing its job.,Not applicable,Symantec Messaging GatewayGood Solid ProductForcepoint Web Security Suite is used to control access for our users to avoid access to personal storage and email in order to prevent sensitive data from being leaked outside of the organization along with blocking malicious websites. We have also deployed the endpoint solution on company laptops so they are protected outside of our organization as well.,Automatically syncs with the master database to have a current list of bad sites Centralized management to all devices Centralized configuration of Categories,Upgrade process Support is sometimes slow to respond The complexity of the configurations,8,+ ROI with Forcepoint overall is worth the cost especially if doing a multi-year subscription - Hardware support is separate from software which can get a little frustrating if not managed well + Once configured, it is very easy to manage devices and make changes,Cisco Umbrella and Check Point 41000 Security Systems,Cisco ASA, Check Point 41000 Security Systems, Check Point Firewall Software Blade, Check Point 21000 AppliancesSolid Web SecurityWe use ForcePoint Web Security to help us get a handle on threats from web browsing as well as content and productivity concerns.,Customized Block Pages AD Integration,None,10,The low cost and high value was great for our ROI,Cisco Web Security and zscalerA best in breed solutionWe've been a long time Web Gateway user. It is used for all web filtering across the enterprise both in the environment and for our remote users. The filtering provides both content filtering and security protection for our environment.,Software just works once installed, not a lot of hand-holding. Good customer support over the phone. Fantastic reports (both ad-hoc and generic out of the box ones).,The documentation is almost too detailed. Many times the same content is duplicated in many different documents. Because it can do so much, upgrades can be complex.,9,Positive from a end user productively standpoint. Having managers do their own reporting is amazing.,Barracuda Web Application FirewallBest on the market web proxy filtering product.The Websense Web Security Suite was used in conjunction with the Websense Content Gateway proxy to provide a secure browsing environment for users. This allowed us to block unwanted categories and URLs from being browsed during company time as well as protecting users from real time threats such as malware and botnets.,Very good category setup for URLs Protection from real time threats Authentication so we know what users were going where and that they were legitimate users,Complex installation and full time management Support times are lengthy unless you pay extra for MCS support,9,Very expensive licensing We saw an increase of productivity and a decrease of malware in the first month,Squid Proxy and Blue Coat ProxySG,Websense Data Security Suite, Websense Triton AP-Email
Windows, Linux, Mac
Forcepoint Web Security
24 Ratings
Score 7.8 out of 101
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>TRScore

Forcepoint Web Security Reviews

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow'>Customer Verified: Read more.</a>
Forcepoint Web Security
24 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>
Score 7.8 out of 101
Show Filters 
Hide Filters 
Filter 24 vetted Forcepoint Web Security reviews and ratings
Clear all filters
Overall Rating
Reviewer's Company Size
Last Updated
By Topic
Industry
Department
Experience
Job Type
Role

Reviews (1-16 of 16)

  Vendors can't alter or remove reviews. Here's why.
Mark Horste profile photo
June 30, 2019

User Review: "Forcepoint Web Security in Healthcare"

Score 8 out of 10
Vetted Review
Verified User
Review Source
We use it across the entire company. All web traffic is routed to our datacenter and the ForcePoint appliance is positioned to monitor all traffic. It was selected for security, compliance and to help manage productivity. The filtering and blocking functionality has provided excellent security as well as providing a method of managing personal web browsing.
  • Security: The security functionality is built in and does nto require any tuning or intervention.
  • Compliance and Governance; The web filtering policies allow us to implement policies and procedures easily. It is very easy to block things like pornography and hate speech.
  • Productivity: We frequently create custom policies for specific groups or individuals when we suspect the are spending too much time on their browsers for nonbusiness-related activities.
  • The easiest way to set an exclusion is in a list. Unfortunately, the list is limited to 500 lines.
  • The initial setup with the appliances and hybrid services are difficult to understand.
  • Upgrading the system is complicated due to the distributed nature of the system with servers and appliances. I upgraded something out of order and spent a few days on the phone with tech support to fix it.
The solution appears to be a well-balanced one suitable for anyone in a regulated industry. We also use the email security solution and the interfaces are very similar which makes management easier. It does require a high level of understanding of security processes and procedures and may not be suitable for smaller organizations with limited staff. However, once configured the ongoing maintenance is not burdensome.
Read Mark Horste's full review
Alan matson profile photo
June 21, 2019

Review: "Forcepoint Web Security is better than the competition thinks."

Score 9 out of 10
Vetted Review
Verified User
Review Source
Currently Forcepoint Web Security is used to monitor and protect 50,000 users for a large state agency. This is used to keep our employees protected from emerging threats as well as controlling non business related web requests filtered to ensure safety and compliance.
  • Very good filtering and deep packet inspection for SSL
  • ICAP support for Data Loss Prevention
  • Protection of Web email Channels for loss.
  • Complex Management require full time
  • Better license model, too much like Cisco with multi licenses.
Of all the proxy products I have tested Forcepoint is on top, better than Cisco Web or Blue Coat.
Read Alan matson's full review
Erwin van Amstel profile photo
June 19, 2019

Review: "Forcepoint Web Security used on a daily basis"

Score 10 out of 10
Vetted Review
Verified User
Review Source
Within our company, we use Forcepoint Web Security as part of our total online security strategy. It is used in our entire EMEAR-wide organization. All of our main user internet traffic is proxied through
the Forcepoint Web Security program. Forcepoint Web security is used as an SSL inspecting
proxy, scanning all traffic (inbound and outbound) for malicious content. The main advantage for our environment is the granular
delegation of its administration which is assigned via the active directory. We allow local departments to implement their own rule sets besides the mandatory rule set which is dictated at a corporate level.
  • Delegated administration.
  • Single management interface for web, data and email security.
  • Cloud integration.
  • New products are sometimes released to market before they are fully evaluated.
  • The first implementation requires a lot of attention, especially the sizing of the platform, but once it's all set up its smooth sailing.
Forcepoint Web Security can be used in all environments where you would want to
make sure that your users don’t spend time browsing malicious sites or downloading malicious
content. It can also be used to prevent access to other unwanted resources like
streaming media, file share locations, etc. In my opinion, it's less useful if you rely on old technology
like Java, or proprietary software, which cannot handle authenticating proxy
servers. Also, if you rely heavily on end to end encryption, it needs
more configuration and maintenance.
Read Erwin van Amstel's full review
No photo available
June 19, 2019

Forcepoint Web Security Review: "A solid product for Web Security"

Score 8 out of 10
Vetted Review
Verified User
Review Source
We used Forcepoint Web Security Cloud for our entire organization. The setup was essentially a proxy server in the cloud (previously we used a Websense/Forcepoint proxy appliance onsite). All web browsing from users' laptops were filtered in the cloud. This added a nice layer to our layers of defense strategy.
  • Reporting was excellent. You could run a variety of canned reports or create your own.
  • You could easily group users and apply different web filtering policies.
  • Was cloud hosted so there was no onsite equipment to maintain. Only end-user software installs.
  • Despite having excellent reporting, I could never get a report that tells me what the user either entered or clicked on. It was always tons of data/links that load with every page. So it's very difficult to see what a user did. Not sure any web filtering software can do this.
  • The endpoint software install / uninstall was a bit challenging. It gets it's hooks in at the network level, so it drops the connection during installs.
  • Didn't filter all traffic on our network. Maybe this was another component they have, but our installation was at the endpoint level. This left plenty of other devices to connect to whatever they wanted unfiltered.
  • Had to create exceptions to bypass the proxy server for various applications. This is ok for a few things, but it got to be ridiculous. So many things were bypassing the proxy server that it felt like swiss cheese security.
A good tool for filtering end-users' web browsing. Making sure they don't hit bad/malicious sites.
Read this authenticated review
No photo available
June 19, 2019

Review: "Forcepoint Web Security is a good flexible tool to protect your user community."

Score 9 out of 10
Vetted Review
Verified User
Review Source

Forcepoint Web Security is being used throughout our entire organization. It is used to provide web content filtering that follows our Compliance, HR, Information Security, and Legal policies.

In addition, it provides our users a layer of protection from malicious web content that is updated multiple times a day. This is very important in today's electronic communication environment where users are getting bombarded with very realistic looking SPAM and malicious e-mails that want users to "Click on this link" to....

  • Prevent access to suspicious or malicious web sites.
  • Keep their database of malicious or suspicions web sites current.
  • Allows us to customize/fine tune user access to sites. We can allow some people to access sites while preventing other from accessing those sites.
  • The support when I call in could be better. When I call in with a high priority issue, I have to wait while the agent tries to reach the technician that works on my account. If they are not available then I need to leave information for the technician. This is no better than me opening a ticket from within their customer portal.
  • Some of their upgrade documentation could be more detailed and kept up to date.

It is well suited for:

  • Controlling web browsing access to categories of sites. (Ex. News, Sports, Network Storage, Adult)
  • Allowing the administrators to fine tune the access so some people can get to specific sites while others cannot. (Ex. Marketing and PR people can get to Facebook while the rest of the organization cannot.)
  • Disabling the ability to use certain protocols such as FTP or P2P.

Forcepoint Web Security is not well suited for environments that are very permissive regarding what sites users can access. In this scenario, there may not be a need to go to the expense of building and maintaining this infrastructure if you allow users to get to most content (ex. universities).

Read this authenticated review
No photo available
July 12, 2019

Forcepoint Web Security Review: "There are better alternatives in the current market"

Score 6 out of 10
Vetted Review
Verified User
Review Source
Forcepoint Web Security, Formerly Websense(used to be called WSG), is Forcepoint's solution for Web Proxy.
This is currently our Proxy solution in the company. We have hybrid deployment - meaning we have an agent on all of our endpoints to make sure that even when using outside the network, the web access will be controlled.
When using in the office, we have on-prem local proxies. The policies allow one to control access to categories/protocols. You can allow, block or limit and also control the ability to download files. There is also a built-in AV, which in my opinion doesn't do much. The new feature of Shadow IT can help you detect the usage of Shadow IT in your network.
  • The ability to set policies is very simple.
  • Logging and monitoring are detailed and easy to run.
  • Deploying new proxies are now much more simple with the proxy appliances. In the past, you had to install the OS and software.
  • From time to time services stop working, so you need to manually restart them.
  • Endpoint agents can cause problems in all kind of situations such as during a flight, hotel wifi, if the user is in China, some ISP's, etc.
  • Some settings cannot be changed from the management server and you'll need to do them on each proxy server manually.
  • Support in O365 apps does not always work and can cause issues. We had to configure some bypasses in order to solve them.
I believe Forcepoint Web Security can be very good if most of your users are working from the office. If you have a lot of mobile employees, or if all your workstations are laptops, things get more complicated and problems start to occur. When these happen and you start working with their support - good luck with that. I'm very disappointed with their support, they maybe have a few people there who actually know something. Most of them do very simple checks that I know how to do myself.
Read this authenticated review
No photo available
July 01, 2019

Forcepoint Web Security Review: "Forcepoint offers one of the best web security solutions on the market today."

Score 10 out of 10
Vetted Review
Reseller
Review Source
We use FP Web Security at the whole organization, it provides a high level of security in the web browsing of users, decreasing the number of computers infected by malicious software, in addition to providing controlled access to resources that users require. It also helps us to comply with regulations regarding the protection of information from our customers and users.
  • It has a very good level of detection of malicious software which helps our equipment to remain protected.
  • It has very accurate DLP detection engines that help facilitate the implementation of this type of policy.
  • Realizes a categorization of the websites in a very adequate and fast way, allowing you to manage the access to multiple categories of sites for each user or group of users.
  • It has multiple forms of administration of web access, based on schedules, available bandwidth, whether the user is in the corporate network or not, etc.
  • Improve or enable the DLP integration for the cloud solution in a more transparent way.
  • Add integration options with MDM providers for filtering on mobile devices.
In any scenario that requires a high level of security for web traffic, Forcepoint is a very good option. Perhaps if the need is just a simple web filtering there are other options. If the DLP protection for web traffic is a high requirement, then Forcepoint Web Security will be one of the best options.
Read this authenticated review
No photo available
July 01, 2019

"Forcepoint Web Security review"

Score 9 out of 10
Vetted Review
Verified User
Review Source
Forcepoint is used for two purposes. First, to scan all emails inbound and outbound for malware and spam, etc. Second, all web traffic is scanned after having passed through a squid proxy server. The primary objective is to stop malware in emails from entering the organization and stop malicious websites.
  • The control panel is good and the email search functionality is very good, note the default storage time for email history is 30 days.
  • You can have multiple profiles for different departments: one department needs more access to social media than other departments, for example.
  • Whitelist functionality is easy to access.
  • You cannot add whitelists to allow known organizations who send encrypted emails through without catching them all.
  • Sometimes the email history systems falls behind the actual filtering so you cannot review an email although you have been warned about it.
  • We have had some occasions when Forcepoint has been blacklisted with some internet systems.
Forcepoint is well suited to organizations where you want to fit and forget and let the software get on with the filtering. The default filtering options do a very good job of clearing spam and malware out of the box. I think it would be a good fit for most organizations.
Read this authenticated review
No photo available
June 21, 2019

Review: "Forcepoint Web Security - Our go to WebFiltering platform"

Score 9 out of 10
Vetted Review
Verified User
Review Source
We have been using Forcepoint Web Security for 3 years now. We have used WebFiltering systems since we started in 2006. Our first experience was with SurfControl which was acquired by Websense which was acquired by Forcepoint. We are not new to this. We use Forcepoint Web Security across our entire organization as part of our Forcepoint suite (we also have Forcepoint Email Security). We have always tried to help users with this massive spam problem that everyone has and we use it to monitor and protect our users from going to unwanted websites and non productive sites.
  • Protects users from non productive sites so they can focus on work
  • Protects users from unwillingly entering unwanted sites like pornography and malicious content sites
  • Allows us to deploy internet access per groups with particular categories that fit their job functions
  • Setting it up can be complicated. Not for low level IT people with less experience.
  • Forcepoint Support can improve. Slow response times and usually they think that the user has a high level IT background.
  • Forcepoint core updates are used in marketing campaigns but when you call support they recommend not updating to a higher version because of problems and bugs. Why market new improvements and new features if they do not work?
Great categorization. Have found maybe 3 sites that were not categorized correctly but have been fixed quickly by support. It works as good as you configure it. Correct configuration is a must. This is not an application that will partially work. If all components are not configured correctly it won't work at all. At least this is my experience.
Read this authenticated review
No photo available
June 21, 2019

Forcepoint Web Security Review: "Brevity and Honesty"

Score 9 out of 10
Vetted Review
Verified User
Review Source
Forcepoint is used organisation wide as a cloud based reverse proxy. It resolves productivity and threat based issues with users' machines. Due to the implementation of Forcepoint we have a much better understanding of users' browsing behaviour and are better able to respond to web based threats if a user clicks on a malicious link.
  • Good categorisation
  • Excellent customer support
  • Easy to use
  • Reasonable pricing
  • No limit to URLs
  • More industry wide collaboration is needed not just from Forcepoint but all vendors of similar products in this space
  • Always good/perfect in terms of usability/functionality.
  • Could do with removing limitations on the number of URLs
Read this authenticated review
No photo available
June 19, 2019

Forcepoint Web Security Review: "Forcepoint: Great Product"

Score 8 out of 10
Vetted Review
Verified User
Review Source
This is our primary web filter and works great. We used this to replace the Websense software we had before. At this point, it has worked great and we have had no issues.
  • Block inappropriate sites
  • Block malicious sites
  • Blocks unwanted ads
  • Currently have a problem with endpoints updating properly
I have no issues at all with the product. It has and continues to do a good job. The best part is blocking malicious sites when users accidentally click on the links.
Read this authenticated review
No photo available
June 18, 2019

Forcepoint Web Security Review: "It’s brilliant!"

Score 10 out of 10
Vetted Review
Verified User
Review Source
We use ForcePoint cloud-based email and web security software to filter mail and provide web proxy filtering. All incoming and outgoing mail passes through the filter and all user web traffic is filtered by the cloud proxy.
  • Single pane of glass for email and web security
  • Excellent customer service
  • Clear help articles
  • The support portal is outdated.
It is suitable for all email and web browsing situations. If configured correctly it can work seamlessly in all scenarios.
Read this authenticated review
No photo available
June 26, 2018

Forcepoint Web Security Review: "Good Solid Product"

Score 8 out of 10
Vetted Review
Verified User
Review Source
Forcepoint Web Security Suite is used to control access for our users to avoid access to personal storage and email in order to prevent sensitive data from being leaked outside of the organization along with blocking malicious websites. We have also deployed the endpoint solution on company laptops so they are protected outside of our organization as well.
  • Automatically syncs with the master database to have a current list of bad sites
  • Centralized management to all devices
  • Centralized configuration of Categories
  • Upgrade process
  • Support is sometimes slow to respond
  • The complexity of the configurations
Overall, I believe ForcePoint is a good solid product though there are some environments were other solutions work better and may be more cost-effective.
Read this authenticated review
Jay Stelmach profile photo
September 25, 2017

Forcepoint Web Security Review: "Solid Web Security"

Score 10 out of 10
Vetted Review
Verified User
Review Source
We use ForcePoint Web Security to help us get a handle on threats from web browsing as well as content and productivity concerns.
  • Customized Block Pages
  • AD Integration
  • None
We deployed it across the entire company. We are using just the Web Security Gateway portion of the product at this point. We use a 95% virtualized workstation environment (VDI). We were able to add the agent to all of our VDI clients before resynchronizing them and we used GPO to push out the agents to our physical devices. We are leveraging the cloud based system and it is working very well for us.
Our previous solution would not allow us to download at speeds greater than 1Mbps and ForcePoint allows us to leverage our full bandwidth.
It allows us to monitor and block web pages as necessary. We now only need to block on content and productivity since Forcepoint always scans the content. This is a specific distinction because many people block webpages due to risk and with Forcepoint, we don't have to worry about risk. We can focus on productivity factor of the websites instead.
Due to the flexibility of the product, I cannot imagine the product not being able to handle any scenario.
Read Jay Stelmach's full review
No photo available
September 26, 2017

Forcepoint Web Security Review: "A best in breed solution"

Score 9 out of 10
Vetted Review
Verified User
Review Source
We've been a long time Web Gateway user. It is used for all web filtering across the enterprise both in the environment and for our remote users. The filtering provides both content filtering and security protection for our environment.
  • Software just works once installed, not a lot of hand-holding.
  • Good customer support over the phone.
  • Fantastic reports (both ad-hoc and generic out of the box ones).
  • The documentation is almost too detailed. Many times the same content is duplicated in many different documents.
  • Because it can do so much, upgrades can be complex.
Well suited for enterprise deployments. Endpoint protection is harder to roll out to production; remote web filtering has been the red-headed stepchild for us.
Read this authenticated review
Alan Matson, CCNA:S, MCP profile photo
April 27, 2016

Forcepoint Web Security Review: "Best on the market web proxy filtering product."

Score 9 out of 10
Vetted Review
Verified User
Review Source
The Websense Web Security Suite was used in conjunction with the Websense Content Gateway proxy to provide a secure browsing environment for users. This allowed us to block unwanted categories and URLs from being browsed during company time as well as protecting users from real time threats such as malware and botnets.
  • Very good category setup for URLs
  • Protection from real time threats
  • Authentication so we know what users were going where and that they were legitimate users
  • Complex installation and full time management
  • Support times are lengthy unless you pay extra for MCS support
I believe every business should have some type of web security/filtering for their users. This will decrease time spent on sites that are not work related such as Facebook and YouTube while protecting them from the many real time threats on networks such as things like Crypto locker.
Read Alan Matson, CCNA:S, MCP's full review

Forcepoint Web Security Scorecard Summary

About Forcepoint Web Security

Forcepoint Web Security allows companies protect every user, everywhere. The vendor says, with real-time advanced threat protection, built in cloud application security, cloud sandboxing and DLP scanning, you get a comprehensive security solution built for today’s mobile and global workforce.
  • Deep content inspection for pages and links, powered by Forcepoint’s ACE (Advanced Classification Engine) technology to identify zero day, advanced threats, and data theft attempts.
  • Insight and visibility to the cloud application landscape within your organization with Shadow IT discovery, and user and risk ranking. Extend the built-in CASB capabilities to control sanctioned cloud apps across managed devices with anomaly detection and behavioral analytics. Seamlessly upgrade to our full CASB suite for reverse proxy and API mode, and BYOD support.
  • A centralized reporting system enables granularity and customization through an intuitive and easy to use drop and drop interface.
  • Highly secured and always available Forcepoint cloud so you can extend web protection to roaming users with global coverage from the industry’s only certified global cloud infrastructure (ISO 27001, 27018, CSA STAR).
  • Flexible deployments options with a choice of pure cloud (SaaS), hybrid cloud, or on-premise – via a single SKU.
  • Seamlessly integrated with all Forcepoint solutions for a true enterprise security platform; NGFW, CASB, DLP, Email Security, Insider Threat, and Behavioral Analytics.

Forcepoint Web Security Features

Has featureShadow IT discovery and risk ranking
Has featureCloud Application Control and full CASB upgrade
Has featureData Loss Prevention (DLP)
Has featureCloud Sandbox

Forcepoint Web Security Competitors

Pricing

Does not have featureFree Trial Available?No
Does not have featureFree or Freemium Version Available?No
Has featurePremium Consulting/Integration Services Available?Yes
Entry-level set up fee?No

Forcepoint Web Security Technical Details

Deployment Types:On-premise, SaaS
Operating Systems: Windows, Linux, Mac
Mobile Application:No