Forcepoint Web Security used on a daily basis
June 20, 2019

Forcepoint Web Security used on a daily basis

Erwin van Amstel | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Forcepoint Web Security

Within our company, we use Forcepoint Web Security as part of our total online security strategy. It is used in our entire EMEAR-wide organization. All of our main user internet traffic is proxied through
the Forcepoint Web Security program. Forcepoint Web security is used as an SSL inspecting
proxy, scanning all traffic (inbound and outbound) for malicious content. The main advantage for our environment is the granular
delegation of its administration which is assigned via the active directory. We allow local departments to implement their own rule sets besides the mandatory rule set which is dictated at a corporate level.
  • Delegated administration.
  • Single management interface for web, data and email security.
  • Cloud integration.
  • New products are sometimes released to market before they are fully evaluated.
  • The first implementation requires a lot of attention, especially the sizing of the platform, but once it's all set up its smooth sailing.
  • Forcepoint Web Security requires investment in purchase and time spent to gain knowledge on how to implement and manage the product.
  • We cannot say for sure how much is saved, but in the reports, we see that a lot of malicious content is blocked and that access to non-business related sites is restricted where it is needed.
In the past, we have tested other products as well, but they all missed one or more key functions like:
  • Real delegated administration
  • SSL inspection
  • AD integration
  • Ease of management
  • Cooperation between email, web, and DLP
Forcepoint Web Security can be used in all environments where you would want to
make sure that your users don’t spend time browsing malicious sites or downloading malicious
content. It can also be used to prevent access to other unwanted resources like
streaming media, file share locations, etc. In my opinion, it's less useful if you rely on old technology
like Java, or proprietary software, which cannot handle authenticating proxy
servers. Also, if you rely heavily on end to end encryption, it needs
more configuration and maintenance.

Using Forcepoint Web Security

3500 - All trades in a company, from manufacturing to sales and finance.
10 - We have two persons managing Forcepoint Application on a management level, The other persons involved are Service desk members supporting the user request for exceptions and alterations
  • We have basically one main use case: Protect internet access for our users.
  • None that i'm aware of currently.
  • We would like to extend the implementation of DLP.
We are really satisfied with the Forcepoint product line and we are very likely to renew when the time comes!