Use the Forcepoint
December 20, 2019

Use the Forcepoint

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Forcepoint Web Security

Forcepoint Web Security is used by my company to manage employee access to acceptable websites, reduce time spent on frivolous sites, and to manage some of the features that we want to permit within social media sites. It is also a defense-in-depth layer for malicious attacks that call out to the Internet to download scripts. We have also used it in security investigations for threat hunting, to search for unusual website access, as well as finding other outliers, like users hitting a certain site thousands of times over.
  • Good dashboard overview
  • Targeted policies on users, IPs, subnets
  • Sometimes requires a logoff/logon to validate website access
  • Occasional service restarts needed as a troubleshooting measure
  • Blocking malicious website callouts reduces workstation compromise impact
  • Enables implementation of HR-based acceptable use policies
Each product has strengths and weaknesses. Since we can leverage an agent on the local workstation that applies our Forcepoint Web Security policies, we like the consistency this offers, and that we can utilize our on-premises Web Security and local agents in a uniform manner. There are more specific administrative features that we can apply beyond a per-user or group basis, leveraging IP-based policies, and we are happy with this solution.
Great enterprise tool, uses existing directories for user, group, and IP-based custom permissions against common site category groupings for policies. The exceptions allow date expiration, which helps keep exceptions limited instead of going into perpetuity. It uses Microsoft technologies, which helps make it manageable within the skillsets of SQL and Windows administrators.