Skip to main content
TrustRadius
Forcepoint SWG

Forcepoint SWG
Formerly Forcepoint Web Security

Overview

What is Forcepoint SWG?

The Forcepoint ONE Secure Web Gateway (SWG) is one of the three foundational gateways of the Forcepoint ONE all-in-one cloud platform. Forcepoint ONE SWG monitors and controlsany interaction with any website, including blocking access to websites based on category and…

Read more
Recent Reviews

TrustRadius Insights

Forcepoint Secure Web Gateway has proven to be a valuable tool for organizations in various departments, ensuring secure browsing of the …
Continue reading

Forcepoint Security

10 out of 10
December 10, 2020
Incentivized
It's a good solution and works for us in hybrid as well as central proxy. We are currently using this solution throughout the …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Return to navigation

Product Demos

Mac OS Endpoint Installation | Forcepoint Web Security Cloud

YouTube
Return to navigation

Product Details

What is Forcepoint SWG?

The Forcepoint ONE Secure Web Gateway (SWG) is one of the three foundational gateways of the Forcepoint ONE all-in-one cloud platform. Forcepoint ONE SWG monitors and controlsany interaction with any website, including blocking access to websites based on category and risk score, blocking download of malware, blocking upload of sensitive data to personal filesharing accounts, detecting shadow IT, and optionally providingRemote Browser Isolation (RBI) with Content Disarm andReconstruction (CDR).

Forcepoint SWG Features

  • Supported: Shadow IT discovery and risk ranking
  • Supported: Cloud Application Control and full CASB upgrade
  • Supported: Data Loss Prevention (DLP)
  • Supported: Cloud Sandbox

Forcepoint SWG Video

Forcepoint Web Security Cloud Features

Forcepoint SWG Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationNo

Frequently Asked Questions

The Forcepoint ONE Secure Web Gateway (SWG) is one of the three foundational gateways of the Forcepoint ONE all-in-one cloud platform. Forcepoint ONE SWG monitors and controlsany interaction with any website, including blocking access to websites based on category and risk score, blocking download of malware, blocking upload of sensitive data to personal filesharing accounts, detecting shadow IT, and optionally providingRemote Browser Isolation (RBI) with Content Disarm andReconstruction (CDR).

Zscaler Internet Access and Netskope Public Cloud Security are common alternatives for Forcepoint SWG.

The most common users of Forcepoint SWG are from Mid-sized Companies (51-1,000 employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(137)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Forcepoint Secure Web Gateway has proven to be a valuable tool for organizations in various departments, ensuring secure browsing of the internet and addressing a range of security concerns. Users have reported that the application effectively blocks malicious threats while allowing users to browse the internet, providing an effective layer of security. This has helped organizations protect their computers and laptops from potential threats, giving IT departments peace of mind.

Additionally, the software has been instrumental in managing productivity, as it enables different departments to access specific categories of websites and allows managers to review internet activity. HR teams have found value in the user site visit data managed by Forcepoint Secure Web Gateway, which has proven helpful in certain cases. Moreover, the ability to quickly generate standard reports from the report catalog has made it easier for organizations to monitor web traffic and measure internet usage.

In public-sector organizations, the software ensures that users and staff are accessing websites aligned with mission goals. Libraries have leveraged its functionality to enable filtering of staff and patron internet usage, meeting requirements for CIPA compliance and qualifying for E-Rate funding.

Customers have also praised Forcepoint Secure Web Gateway's scalability and ease of deployment across multiple locations. The granular delegation of administration via active directory has allowed local departments to implement their own rule sets, enhancing efficiency and effectiveness.

Overall, customers have found this product to be a reliable solution for securing web traffic, preventing threats, managing productivity, and ensuring compliance with organizational policies.

Helpful and Clear Help Articles: Reviewers have praised the clear and helpful help articles provided by Forcepoint Secure Web Gateway. These articles were found to be a valuable resource in understanding and utilizing the software effectively, with some users mentioning that they served as a comprehensive reference point for various tasks and functionalities. The availability of these detailed and informative articles not only contributed to a smoother learning curve but also helped troubleshoot issues independently, reducing the reliance on customer service support.

Time-saving Feature: Users appreciate the time-saving aspect of Forcepoint Secure Web Gateway's clear and easily accessible help articles. With these resources readily available, reviewers mentioned being able to find answers to their questions quickly, allowing them to continue working without interruptions. This feature has been particularly useful in minimizing downtime caused by seeking support from customer service or navigating complex user manuals.

Commitment to Customer Satisfaction: The inclusion of clear help articles demonstrates Forcepoint Secure Web Gateway's commitment to customer satisfaction. Reviewers highlighted how this comprehensive resource eliminates unnecessary back-and-forth communication with customer support, as it provides extensive information upfront. By offering detailed guidance through these articles, Forcepoint Secure Web Gateway ensures users have access to reliable self-help options, enhancing overall user experience.

  1. Poor User Interface: Multiple users have expressed frustration with the confusing and non-user-friendly interface of Forcepoint Secure Web Gateway, making it difficult to navigate and causing difficulties during installation.

  2. Limited Configuration Options: Some users feel that the software lacks flexibility in defining usage, as the options for configuring policies and exceptions are limited compared to other available options in the market.

  3. Slow Support Response Times: Users have reported slower support response times compared to other vendors, with issues taking 3 to 5 days to resolve, indicating a need for more efficient and responsive customer support from Forcepoint.

Attribute Ratings

Reviews

(1-25 of 75)
Companies can't remove reviews or game the system. Here's why
Anjum Arora | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • DLP protection via keywords identified
  • Multiple mediums coverage like Outgoing emails, USB storage, FTP, Chat applications etc.
  • Constantly learning interface by enhancing the keywords
  • Restricted to keywords entered by the client. Could do well with giving suggestions based on industry trends
  • Needs to be used in conjunction with other security tools like Crowdstrike to block external devices connecting with laptop
  • Deep document level indexing & monitoring capabilities would be great to have in Forcepoint
Score 7 out of 10
Vetted Review
Verified User
Incentivized
  • It can be integrated with the DLP module
  • Hybrid capabilities
  • Can be integrated with Forcepoint AMD for sandboxing
  • Helps us to restrict access of unwanted sites
  • The hybrid agent should get updated automatically
  • Some sites are not proxy friendly, which causes issues
  • Time taken for the policy to sync in cloud
December 15, 2021

WebSecurity

Boon Leng David Aw | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User
  • Hybrid mode deployment —cloud.
  • Able enforce web content filtering at home.
  • Implement for both office and remote users.
  • In recent hybrid mode deployment, it was discovered that quota time was not able to apply for the remote user.
  • The existing office encountered a challenge to deploying Forcepoint Web Security.
  • To consider price competitive for global deployment.
Score 3 out of 10
Vetted Review
Verified User
Incentivized
  • Forcepoint Web Security met our requirements for a scalable on-premises secure web gateway solution.
  • Forcepoint Web Security met our requirements for providing flexible policy assignments for users.
  • Our largest challenge with Forcepoint Web Security is the difficulty of performing version upgrades.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
  • Full SASE suite for threat and data security
  • Robust ACE engine
  • DLP integration
  • Sandboxing
  • Control and visibility for non-web protocol
  • Application visibility and CASB
Score 7 out of 10
Vetted Review
Verified User
Incentivized
  • Customization of configuration and block pages
  • Performance for web browsing is very good
  • Easy to troubleshoot with logging
  • Supports high available configurations (clustered setup) and virtual servers
  • Does not support web sockets, used by (e.g., WhatsApp Web, Spotify, call/video apps) unless you install client software
  • Learning curve can be steep
  • Sometimes lagging behind modern browsers (e.g., when SAN in SSL became a requirement)
  • May not support TLS 1.3 decryption fully
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • It prevents users from accessing websites that may have recently been created for the purpose of distributing malware.
  • It prevents users from accidentally or intentionally accessing websites that are considered inappropriate for a work environment.
  • It allows us to create different policies for different teams in our organization.
  • Forcepoint Web Security can be improved by making the setup less bloated. We have two proxy servers clustered together for each environment, and we currently have environments for our campus, server, DMZ, and external networks. The setup and maintenance of the application can be cumbersome.
  • Updating the agent needs to be implemented better. Instead of having to create and push out updates for the agents, there should be a way agents can get software updates directly from Forcepoint Web Security.
  • Accessing the web content gateway to make changes is also not as streamlined as I would like and it should be improved.
Chandan Singh Rathore | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
  • Categorization
  • Real-time security updates for threat protection
  • It has a centralized granular policy controls
  • Content Filtering
  • Customer Support
  • Scalability and throughput
  • Documentation availability
  • Pricing should be bit lower
December 28, 2020

Reassured Cybersecurity

Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Forcepoint DLP alerts of potential data security issues with data leaving the organization.
  • Forcepoint web filtering also protected against users navigating to malicious sites.
  • Endpoint solution supports logging and monitoring to alert security control center.
  • Fine tuning is required for various DLP flags.
  • False positives require deep-dive investigations so staffing and timing are required for research.
  • Web filtering not always accurate and additional tuning needed for categorization.
December 10, 2020

Forcepoint Security

Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • It works in hybrid mode.
  • The policies and categories are clearly defined.
  • The reporting is good.
  • The cloud setup of the same can be improved.
  • The categories can be detailed out with subcategories.
Andrea Bet | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • URL filtering.
  • Scalability of the management.
  • Easy way to update endpoints.
  • Middle East area (where Government blocks traffic to your local PoP).
  • China area (where you don't have local PoP so it's impossible to point to cloud proxy out of China, because traffic hits the Great Firewall and traffic is sometimes blocked for secured connections).
  • Support expertise.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Blocks malicious sites.
  • Allows restriction complete or by time to sites such as social media.
  • Provides keyword content and category blocking of sites.
  • Provides extensive reporting for browsing and security alerts.
  • Ability to temporarily disable the proxy.
  • More flexible client deployment options.
  • Web chat support.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Blocks malicious and compromised websites.
  • Provides a raft of customizable detailed metrics.
  • Provides very easy to implement content filtering of which there is a lot of default framework ready to go.
  • The endpoint software at times can be a little glitchy.
  • Would be good to be able to temporarily disable the filter via the client for troubleshooting and admin purposes.
  • Would be good to be able to manually set a Geo location for better response.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Content Filtering
  • APT
  • Web Traffic Analysis
  • Please include support for other protocols as well. We intend to use the product for perimeter security for all the incoming and outgoing traffic. The limitation is that we had to divert the HTTP traffic to forecpoint web security appliance and rest of the traffic to other device.
  • Integration with IBM SOAR Solution
  • Support for Email Traffic including IDN support
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Its most valuable aspect is the efficient, immediate support.
  • Works seamlessly very well on SSL interception and packet deep inspection
  • Gives very flexible and most restrictive options in threat mitigation
  • Stripping scripts from webpages helps fight drive-by, dropper, and cryptic common threats flood.
  • It's very helpful in creating policies to block and safeguard from content and categories that are culturally and regionally sensitive.
  • I would like to see improvement in Triton Manager response and resource consumption.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • It gives us a high-level snapshot of what are users are doing online.
  • It allows us to have a generous Acceptable Use Policy because we know that abuses will be easy to spot.
  • It gives us a way to allow temporary access to otherwise blocked sites.
  • Its tools for creating policies and exceptions is confusing in certain areas.
  • Some of its online help topics don't provide as much detail as we would like.
Return to navigation