Overview
What is Forcepoint SWG?
The Forcepoint ONE Secure Web Gateway (SWG) is one of the three foundational gateways of the Forcepoint ONE all-in-one cloud platform. Forcepoint ONE SWG monitors and controlsany interaction with any website, including blocking access to websites based on category and…
Forcepoint is a force to reckon with!
Protects the organization
WebSecurity
Decent product with poor support
Meets requirements but in our experience does not lend itself well to remote workers
Forcepoint Web Security: Content security for SMB, which is good enough for even large enterprises
Forcepoint Web Security: Secures Your Browsing Traffic
Extend content and threat protection to off-premises EUC
Forcepoint Web Security: An application that does what we expect it to do
Forcepoint Web Security- The Industy leader in Content filtering and Security
Reassured Cybersecurity
You can make it better
Forcepoint Security
Forcepoint killed 'em all!
Excellent threat protection and Productivity monitoring with now in house overheads.
Awards
Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards
Product Demos
Mac OS Endpoint Installation | Forcepoint Web Security Cloud
Product Details
- About
- Competitors
- Tech Details
- FAQs
What is Forcepoint SWG?
Forcepoint SWG Features
- Supported: Shadow IT discovery and risk ranking
- Supported: Cloud Application Control and full CASB upgrade
- Supported: Data Loss Prevention (DLP)
- Supported: Cloud Sandbox
Forcepoint SWG Video
Forcepoint SWG Competitors
Forcepoint SWG Technical Details
Deployment Types | On-premise, Software as a Service (SaaS), Cloud, or Web-Based |
---|---|
Operating Systems | Windows, Linux, Mac |
Mobile Application | No |
Frequently Asked Questions
Comparisons
Compare with
Reviews and Ratings
(137)Community Insights
- Business Problems Solved
- Pros
- Cons
Forcepoint Secure Web Gateway has proven to be a valuable tool for organizations in various departments, ensuring secure browsing of the internet and addressing a range of security concerns. Users have reported that the application effectively blocks malicious threats while allowing users to browse the internet, providing an effective layer of security. This has helped organizations protect their computers and laptops from potential threats, giving IT departments peace of mind.
Additionally, the software has been instrumental in managing productivity, as it enables different departments to access specific categories of websites and allows managers to review internet activity. HR teams have found value in the user site visit data managed by Forcepoint Secure Web Gateway, which has proven helpful in certain cases. Moreover, the ability to quickly generate standard reports from the report catalog has made it easier for organizations to monitor web traffic and measure internet usage.
In public-sector organizations, the software ensures that users and staff are accessing websites aligned with mission goals. Libraries have leveraged its functionality to enable filtering of staff and patron internet usage, meeting requirements for CIPA compliance and qualifying for E-Rate funding.
Customers have also praised Forcepoint Secure Web Gateway's scalability and ease of deployment across multiple locations. The granular delegation of administration via active directory has allowed local departments to implement their own rule sets, enhancing efficiency and effectiveness.
Overall, customers have found this product to be a reliable solution for securing web traffic, preventing threats, managing productivity, and ensuring compliance with organizational policies.
Helpful and Clear Help Articles: Reviewers have praised the clear and helpful help articles provided by Forcepoint Secure Web Gateway. These articles were found to be a valuable resource in understanding and utilizing the software effectively, with some users mentioning that they served as a comprehensive reference point for various tasks and functionalities. The availability of these detailed and informative articles not only contributed to a smoother learning curve but also helped troubleshoot issues independently, reducing the reliance on customer service support.
Time-saving Feature: Users appreciate the time-saving aspect of Forcepoint Secure Web Gateway's clear and easily accessible help articles. With these resources readily available, reviewers mentioned being able to find answers to their questions quickly, allowing them to continue working without interruptions. This feature has been particularly useful in minimizing downtime caused by seeking support from customer service or navigating complex user manuals.
Commitment to Customer Satisfaction: The inclusion of clear help articles demonstrates Forcepoint Secure Web Gateway's commitment to customer satisfaction. Reviewers highlighted how this comprehensive resource eliminates unnecessary back-and-forth communication with customer support, as it provides extensive information upfront. By offering detailed guidance through these articles, Forcepoint Secure Web Gateway ensures users have access to reliable self-help options, enhancing overall user experience.
-
Poor User Interface: Multiple users have expressed frustration with the confusing and non-user-friendly interface of Forcepoint Secure Web Gateway, making it difficult to navigate and causing difficulties during installation.
-
Limited Configuration Options: Some users feel that the software lacks flexibility in defining usage, as the options for configuring policies and exceptions are limited compared to other available options in the market.
-
Slow Support Response Times: Users have reported slower support response times compared to other vendors, with issues taking 3 to 5 days to resolve, indicating a need for more efficient and responsive customer support from Forcepoint.
Attribute Ratings
Reviews
(51-75 of 75)Forcepoint has increased our security posture and helped meet customer requirements
- Filters the types of sites that users can access.
- Allows the restrictions by security groups.
- Would like users to have the ability to request access to blocked sites.
- Would like more granularity for what gets blocked.
Forcepoint. Beeeeyah!
- HTTPS Decryption
- Filtering
- Endpoint Agent is frequently buggy
- Identification of clients is cumbersome in a mixed environment
Forcepoint Web Security protects our library patrons and saves us thousands in IT purchases
- Easy to manage filtered connections (IP address list).
- The ability to define custom categories for testing the product.
- Forcepoint endpoint client has not worked as expected for the laptops we circulate. Sometimes it requires a Forcepoint login, which we would like to avoid for transparent internet access for our patrons regardless of the network they connect to.
Forcepoint Web Security works well.
- Filtering known bad websites
- Adjusting Policies could use a more intuitive interface.
- Finding a specific computer that has been put into a policy could be easier.
- To keep users from going to known bad websites, it suites well.
- Having an open network such as a public network, it would not work well. This is what our public library has, and they advertise the ability for anyone to visit any website, so we do not utilize the filtering at this location.
Easy Protection with Forcepoint Web Security
- Check bandwidth usage, e.g "bandwidth vampires"
- Control internet access with policies
- Robust reporting!
- Easy to use interface and very user-friendly "User Administrative" interfaces
- Extremely stable and no sudden issues
- Complete Active Directory integration. Users have to be manually removed if they have been deleted on Active Directory, therefore you can have some users who still exist but have been deleted from Active Directory and consume licenses
- Some configurations are only available via Linux CLI which can be intimidating for Windows or "GUI users" on the appliance configurations
- There are three parts of the system and some people don't know that and that can be confusing, i.e. Web Security, Content Management Gateway and Appliance Management. It can be simplified to be one system or at least have it be more obvious that there are three "parts"
- Some sites struggle to be accessed and some have to be "bypassed" because of some known issues with the sites
Endpoint security web filtering software for security assurance
- Web security.
- Endpoint protection.
- Better user interface.
Web Filtering Made Easy
- Easy to deploy.
- Support is great.
- Cost-effective solution.
- The GUI is a little confusing and could use some cleaning up.
- Updates are good generally, but there seem to be too many updates for this product.
- When uninstalling, it leaves the system proxy settings enabled, forcing a manual fix.
There are better alternatives in the current market
This is currently our Proxy solution in the company. We have hybrid deployment - meaning we have an agent on all of our endpoints to make sure that even when using outside the network, the web access will be controlled.
When using in the office, we have on-prem local proxies. The policies allow one to control access to categories/protocols. You can allow, block or limit and also control the ability to download files. There is also a built-in AV, which in my opinion doesn't do much. The new feature of Shadow IT can help you detect the usage of Shadow IT in your network.
- The ability to set policies is very simple.
- Logging and monitoring are detailed and easy to run.
- Deploying new proxies are now much more simple with the proxy appliances. In the past, you had to install the OS and software.
- From time to time services stop working, so you need to manually restart them.
- Endpoint agents can cause problems in all kind of situations such as during a flight, hotel wifi, if the user is in China, some ISP's, etc.
- Some settings cannot be changed from the management server and you'll need to do them on each proxy server manually.
- Support in O365 apps does not always work and can cause issues. We had to configure some bypasses in order to solve them.
- It has a very good level of detection of malicious software which helps our equipment to remain protected.
- It has very accurate DLP detection engines that help facilitate the implementation of this type of policy.
- Realizes a categorization of the websites in a very adequate and fast way, allowing you to manage the access to multiple categories of sites for each user or group of users.
- It has multiple forms of administration of web access, based on schedules, available bandwidth, whether the user is in the corporate network or not, etc.
- Improve or enable the DLP integration for the cloud solution in a more transparent way.
- Add integration options with MDM providers for filtering on mobile devices.
Forcepoint Web Security review
- The control panel is good and the email search functionality is very good, note the default storage time for email history is 30 days.
- You can have multiple profiles for different departments: one department needs more access to social media than other departments, for example.
- Whitelist functionality is easy to access.
- You cannot add whitelists to allow known organizations who send encrypted emails through without catching them all.
- Sometimes the email history systems falls behind the actual filtering so you cannot review an email although you have been warned about it.
- We have had some occasions when Forcepoint has been blacklisted with some internet systems.
Forcepoint Web Security in Healthcare
- Security: The security functionality is built in and does nto require any tuning or intervention.
- Compliance and Governance; The web filtering policies allow us to implement policies and procedures easily. It is very easy to block things like pornography and hate speech.
- Productivity: We frequently create custom policies for specific groups or individuals when we suspect the are spending too much time on their browsers for nonbusiness-related activities.
- The easiest way to set an exclusion is in a list. Unfortunately, the list is limited to 500 lines.
- The initial setup with the appliances and hybrid services are difficult to understand.
- Upgrading the system is complicated due to the distributed nature of the system with servers and appliances. I upgraded something out of order and spent a few days on the phone with tech support to fix it.
- Protects users from non productive sites so they can focus on work
- Protects users from unwillingly entering unwanted sites like pornography and malicious content sites
- Allows us to deploy internet access per groups with particular categories that fit their job functions
- Setting it up can be complicated. Not for low level IT people with less experience.
- Forcepoint Support can improve. Slow response times and usually they think that the user has a high level IT background.
- Forcepoint core updates are used in marketing campaigns but when you call support they recommend not updating to a higher version because of problems and bugs. Why market new improvements and new features if they do not work?
Brevity and Honesty
- Good categorisation
- Excellent customer support
- Easy to use
- Reasonable pricing
- No limit to URLs
- More industry wide collaboration is needed not just from Forcepoint but all vendors of similar products in this space
- Always good/perfect in terms of usability/functionality.
- Could do with removing limitations on the number of URLs
- Very good filtering and deep packet inspection for SSL
- ICAP support for Data Loss Prevention
- Protection of Web email Channels for loss.
- Complex Management require full time
- Better license model, too much like Cisco with multi licenses.
Forcepoint Web Security used on a daily basis
- Delegated administration.
- Single management interface for web, data and email security.
- Cloud integration.
- New products are sometimes released to market before they are fully evaluated.
- The first implementation requires a lot of attention, especially the sizing of the platform, but once it's all set up its smooth sailing.
Forcepoint: Great Product
- Block inappropriate sites
- Block malicious sites
- Blocks unwanted ads
- Currently have a problem with endpoints updating properly
A solid product for Web Security
- Reporting was excellent. You could run a variety of canned reports or create your own.
- You could easily group users and apply different web filtering policies.
- Was cloud hosted so there was no onsite equipment to maintain. Only end-user software installs.
- Despite having excellent reporting, I could never get a report that tells me what the user either entered or clicked on. It was always tons of data/links that load with every page. So it's very difficult to see what a user did. Not sure any web filtering software can do this.
- The endpoint software install / uninstall was a bit challenging. It gets it's hooks in at the network level, so it drops the connection during installs.
- Didn't filter all traffic on our network. Maybe this was another component they have, but our installation was at the endpoint level. This left plenty of other devices to connect to whatever they wanted unfiltered.
- Had to create exceptions to bypass the proxy server for various applications. This is ok for a few things, but it got to be ridiculous. So many things were bypassing the proxy server that it felt like swiss cheese security.
Forcepoint Web Security is being used throughout our entire organization. It is used to provide web content filtering that follows our Compliance, HR, Information Security, and Legal policies.
In addition, it provides our users a layer of protection from malicious web content that is updated multiple times a day. This is very important in today's electronic communication environment where users are getting bombarded with very realistic looking SPAM and malicious e-mails that want users to "Click on this link" to....
- Prevent access to suspicious or malicious web sites.
- Keep their database of malicious or suspicions web sites current.
- Allows us to customize/fine tune user access to sites. We can allow some people to access sites while preventing other from accessing those sites.
- The support when I call in could be better. When I call in with a high priority issue, I have to wait while the agent tries to reach the technician that works on my account. If they are not available then I need to leave information for the technician. This is no better than me opening a ticket from within their customer portal.
- Some of their upgrade documentation could be more detailed and kept up to date.
It is well suited for:
- Controlling web browsing access to categories of sites. (Ex. News, Sports, Network Storage, Adult)
- Allowing the administrators to fine tune the access so some people can get to specific sites while others cannot. (Ex. Marketing and PR people can get to Facebook while the rest of the organization cannot.)
- Disabling the ability to use certain protocols such as FTP or P2P.
Forcepoint Web Security is not well suited for environments that are very permissive regarding what sites users can access. In this scenario, there may not be a need to go to the expense of building and maintaining this infrastructure if you allow users to get to most content (ex. universities).
It’s brilliant!
- Single pane of glass for email and web security
- Excellent customer service
- Clear help articles
- The support portal is outdated.
Good Solid Product
- Automatically syncs with the master database to have a current list of bad sites
- Centralized management to all devices
- Centralized configuration of Categories
- Upgrade process
- Support is sometimes slow to respond
- The complexity of the configurations
A best in breed solution
- Software just works once installed, not a lot of hand-holding.
- Good customer support over the phone.
- Fantastic reports (both ad-hoc and generic out of the box ones).
- The documentation is almost too detailed. Many times the same content is duplicated in many different documents.
- Because it can do so much, upgrades can be complex.
Great Filter, Easy Reporting
- It tracks user activity, which means our HR department has a tool to report on certain users' activities when their productivity vs. internet surfing habits are in question. The reports are pretty simple to create and view and the ability to export to Excel has been useful. The ability to automatically generate and email these reports on a schedule has been useful at times too.
- The ability to set quotas, such as users are allowed to spend 30minutes per day on Facebook or 30minutes a day on shopping sites, which displays the quota for the user when they enter such a site, has been a valuable reminder of our company policies for such activity.
- The ability to prevent certain types of protocols for certain groups of users, such as group xyz is not allowed on FTP sites, or only https, has allowed to consider and set security parameters for different groups of users.
- The ability to easily override any group policy setting for a certain individual if an immediate need for something outside the box arises has been useful. If a certain user is temporarily filling in for another person on vacation and needs additional internet access with less restrictions, we just call out that user specifically in the software and apply a different policy, then easily remove that the following week.
- While the reports are easy to generate, analyzing the data can be challenging. For example, it records every hit on a webpage, so for something like Facebook, every time the page refreshes itself or changes an ad etc. it records it. So, if a user goes to Facebook and actually clicks on two things to read, it could end up showing the had forty clicks, which makes it challenging to HR to determine where the line of "extreme usage" actually is based on these skewed reports.
- We have had three times in 8 years where the software had a table that got corrupted that synchs data from AD, so the usernames were not available for reporting. We had to run reports for a while based on IP address, which could change frequently since we're DHCP like most companies, so the data in the reports were essentially useless during this period. Support helped us solve the issue, but each time it took about a week.
- Support has managed to solve every problem, issue or questions we've had, but it has been slower than most of our vendors. Where we typically get same day support from almost everyone, most Websense support tickets have been 1) open a ticket wait for a call back, 2) get an email requesting more data.. wait, 3) get an email requesting a time to work with us.. wait, 4) get a confirmation than actually get on a shared session to work, 5) be told they had logs to review first or needed to do research and would get back to us in a day or two... 6) more emails... 7) finally an email resolution or screen share to walk us through the resolution or setting change. Typically this was a 3 to 5 day turn around time. Since it's not a critical system for us, though extremely useful, it's not been a bid deal here.
Websense, solid protector and accurate reporter
- The Websense (Forcepoint) reporting is verify accurate and granular. Many solutions don't integrate as closely with Active Directory and there can be windows were traffic can be slightly inaccurate. We are confident in Websense to give us accurate reports when we need them.
- We had a few hiccups in getting our appliances configured wccp with our Cisco firewalls. I engaged support and they were extremely helpful in getting us the updated Cisco configuration we needed to get the appliances communicating.
- The management and reporting console are smooth and intuitive. I can easily follow traffic and patterns to locate infected computers on the network that need to be remedied and also help to triangulate network abusers with our wifi components to remove problem users from our environment.
- Configuration and setup can be a complex. This by itself isn't bad, but their knowledge base site is difficult to search and has multiple versions of instructions for all the different versions of the software available. If you could find the solution and jump to the different software versions from there, it wouldn't be too bad, but it can be a bit of work to find what you want.
- We use their hybrid service for some mobile workstations. The configuration isn't terribly difficult, but it is completely controlled by our management console and uploaded/synced to the cloud. I don't, at this point, have direct access to see the 'cloud' side of things. It isn't a huge problem, but when i'm troubleshooting to get the clients set up it would have been easier to see if the account i was using was in the system.
- When I have to review a user's traffic and they have a large amount of traffic for the day, the web review tool can be slow and time out. You can remove some categories from being displayed (I usually remove the information technology and some infrastructure categories) after the initial traffic loads, but it would be nice to be able to configure that before the traffic logs load (which would reduce the load time and chance for a timeout).
Best on the market web proxy filtering product.
- Very good category setup for URLs
- Protection from real time threats
- Authentication so we know what users were going where and that they were legitimate users
- Complex installation and full time management
- Support times are lengthy unless you pay extra for MCS support
WebSense Review
- Great at managing from a micro level (one staff person) to a macro level (the whole organization)
- GUI interface is easy to use
- Takes little time to manage and maintain. Once running it keeps going!
- It needs the ability to measure bandwidth. I want to know how much a user is taking up. The fact that he/she has 17,000 hits doesn't help.
- Clients, Policies, Filters can be confusing. Maybe it's too complicated and can be simplified?