Overall Satisfaction with Forcepoint Web Security
Within our company, we use Forcepoint Web Security as part of our total online security strategy. It is used in our entire EMEAR-wide organization. All of our main user internet traffic is proxied through
the Forcepoint Web Security program. Forcepoint Web security is used as an SSL inspecting
proxy, scanning all traffic (inbound and outbound) for malicious content. The main advantage for our environment is the granular
delegation of its administration which is assigned via the active directory. We allow local departments to implement their own rule sets besides the mandatory rule set which is dictated at a corporate level.
the Forcepoint Web Security program. Forcepoint Web security is used as an SSL inspecting
proxy, scanning all traffic (inbound and outbound) for malicious content. The main advantage for our environment is the granular
delegation of its administration which is assigned via the active directory. We allow local departments to implement their own rule sets besides the mandatory rule set which is dictated at a corporate level.
- Delegated administration.
- Single management interface for web, data and email security.
- Cloud integration.
- New products are sometimes released to market before they are fully evaluated.
- The first implementation requires a lot of attention, especially the sizing of the platform, but once it's all set up its smooth sailing.
- Forcepoint Web Security requires investment in purchase and time spent to gain knowledge on how to implement and manage the product.
- We cannot say for sure how much is saved, but in the reports, we see that a lot of malicious content is blocked and that access to non-business related sites is restricted where it is needed.
In the past, we have tested other products as well, but they all missed one or more key functions like:
- Real delegated administration
- SSL inspection
- AD integration
- Ease of management
- Cooperation between email, web, and DLP
Using Forcepoint Web Security
3500 - All trades in a company, from manufacturing to sales and finance.
10 - We have two persons managing Forcepoint Application on a management level, The other persons involved are Service desk members supporting the user request for exceptions and alterations
- We have basically one main use case: Protect internet access for our users.
- None that i'm aware of currently.
- We would like to extend the implementation of DLP.