Insider can't be threat anymore with Forcepoint
December 21, 2021

Insider can't be threat anymore with Forcepoint

WAQAS ASGHAR SIPRA | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Forcepoint Insider Threat

We need to stop employees from sharing critical data within and outside the organization [especially] by email and USBs. And restrict them to print [sensitive] information like employee info, bank details, and any other details which relate to personal category. On [the] IT side we [don't] people to share keys and codes outside the organization.
  • Loss of data through Email
  • Copy of sensitive data
  • Sharing of data at all means
  • Printscreen restrictions
  • Printing restrictions
  • Visualization of data
  • Options are hard to find
  • Integration with Active directory
  • Email monitoring including corporate and others like hotmail, gmail etc.
  • Data classification
  • Rule based protection
  • Licenses are bundle up.
  • User based licensing.
  • Renewal cost is almost same as purchasing cost.
We chose Forcepoint because it provides [the] following benefits as [compared] to others; Modifying or stealing confidential or sensitive information for personal gain. Theft of trade secrets or customer information to be used for business advantage or to give to a foreign government or organization. Sabotage of an organization's data, systems, or network.

Do you think Forcepoint Insider Threat delivers good value for the price?

Yes

Are you happy with Forcepoint Insider Threat's feature set?

Yes

Did Forcepoint Insider Threat live up to sales and marketing promises?

Yes

Did implementation of Forcepoint Insider Threat go as expected?

Yes

Would you buy Forcepoint Insider Threat again?

Yes

Email protection, you can see and restrict every kind of email having confidential data for which it provides a catalog building with data classification. Each and every department need to classify its data to see better results through Forcepoint. Because all it [needs] a deep down analysis of each and every information shared through email and other means of sharing.