Easy Protection with Forcepoint Web Security
Overall Satisfaction with Forcepoint Web Security
It is used across the organisation. It addresses web security for our users and allows certain departments to be able to access certain categories of websites (e.g. PR has access to Facebook while others don't). It enables Internet usage and bandwidth usage to be measured easily and to keep track to see if any additional bandwidth for staff is needed.
Pros
- Check bandwidth usage, e.g "bandwidth vampires"
- Control internet access with policies
- Robust reporting!
- Easy to use interface and very user-friendly "User Administrative" interfaces
- Extremely stable and no sudden issues
Cons
- Complete Active Directory integration. Users have to be manually removed if they have been deleted on Active Directory, therefore you can have some users who still exist but have been deleted from Active Directory and consume licenses
- Some configurations are only available via Linux CLI which can be intimidating for Windows or "GUI users" on the appliance configurations
- There are three parts of the system and some people don't know that and that can be confusing, i.e. Web Security, Content Management Gateway and Appliance Management. It can be simplified to be one system or at least have it be more obvious that there are three "parts"
- Some sites struggle to be accessed and some have to be "bypassed" because of some known issues with the sites
- Control of internet usage with organisational policies.
- Secure internet access for users even when not in the office network.
- Have a management view of how the internet is used in the organisation, e.g productivity versus productivity loss.
It downloads database updates more frequently therefore always on the lookout for threats. Easy to use policy assignment. More robust reporting and able to keep records for many years. It doesn't have deep analysis of links on a page.
The web interface wasn't user friendly and not "straight forward."
The web interface wasn't user friendly and not "straight forward."
Using Forcepoint Web Security
410 - They are all Internet users (i.e. all staff) who require protection to access the Internet.
3 - Networking skills
Active Directory
Internet site categorization
Web Caching fundamentals
Access Control Lists
Active Directory
Internet site categorization
Web Caching fundamentals
Access Control Lists
- Secure Internet Access anywhere
- Protection of organisation machines/laptops regardless of location
- Control of Internet Usage
- Identify losses in productivity
- Different user Internet access needs catered for
- Identify unproductive users.
- Identify Internet "bandwidth vampires" which affect other users' Internet speed which could be for the organization's productivity.
- Able to identify a user's IP Address on the system (real-time access tab by hovering on their name) to be able to identify their machines for support by Help Desk.
- Use in IT audits (e.g how many threats within a time frame were blocked, what are the top users being blocked etc.).
- Add the Advanced Malware Protection Module to add another layer of security.
- Increase the number of users who use laptops to further use the Hybrid deployment where the web security policies still apply everywhere and anywhere regardless of your Internet connection.
Evaluating Forcepoint Web Security and Competitors
Not Sure
- Product Features
- Product Usability
- Product Reputation
- Vendor Reputation
Product Features, the organisation being able to provide IT audit reports, control and manage Internet usage,identify anomalities on Internet access and better troubleshooting if there are any issues. To be honest the organisation made the right decision as we don't struggle with the product as it is stable and hardly a problem!
Look at the pricing of the product and licensing fees. As much as it is the best decision the organisation has made regarding it's features and stability the licensing I think is a bit expensive for us.
Forcepoint Web Security Implementation
- Third-party professional services
It was first done by Netfusion for the initial setup which was up to 7.8.4 and for the upgrade from 7.8.4 to 8.5.0 was done by Performanta and they are now our prefered vendor as they are certified Forcepoint Partners
Change management was a big part of the implementation and was well-handled - I'll be talking about the upgrade as I was there: It takes many stakeholders to make things happen. We needed cooperation of other departments as this upgrade impacted the whole staff of Mascom Wireless and it took three days which required no Internet for staff in the evening. This resulted in users understanding the reason for the upgrade and there were no complaints as a result of this
- First night the upgrade failed and had to seek Forcepoint Support help
- There were known issues in the upgrade that were not researched prior to the upgrade
- The upgrade took longer than anticipated (as the first night it failed and we rolled back)
Forcepoint Web Security Support
Pros | Cons |
---|---|
Quick Resolution Good followup Knowledgeable team Problems get solved Kept well informed No escalation required Support understands my problem Support cares about my success Quick Initial Response | None |
Yes - Because not all three of us are actual specialist of the product and if there are issues that we fail to resolve (quickly) then we escalate to Forcepoint Support who offer a good 2nd level support and this makes issue resolution turnaround times less.
When suddenly all users were being resolved by IP Address instead of Active Directory usernames, this made policies assigned to users not apply as the system apply policies to users by Active Directory username. Users were complaining that they were being blocked on sites they normally access and the issue was resolved and answered very quickly (didn't log the call by phone by the way) by Forcepoint Support. It was quickly determined that the service account which made the Active Directory usernames resolution was changed the day before (not realising that it was going to affect the Forcepoint Web Security). We immediately reverted the changes we made to the service account and everything returned to normal
Using Forcepoint Web Security
Pros | Cons |
---|---|
Like to use Relatively simple Easy to use Technical support not required Well integrated Consistent Quick to learn Convenient Feel confident using | None |
- Getting Reports
- Assigning User Policy
- Monitoring system perfomance and using module perfomance dashboards
- Troubleshooting user access policy issues
- Able to determine issues whether it is the Internet or the product having problems
- Knowing that the system has three parts; appliance, web security and content management gateway
- Having to sometimes use a Linux shell on the when you are more skewed to Windows. Most troubleshooting tools on the appliance are Linux CLI based
- When a user is deleted in Active Directory, you have to delete that person again on Forcepoint Web Security
Comments
Please log in to join the conversation