Forcepoint Web Security: Secures Your Browsing Traffic
October 15, 2021

Forcepoint Web Security: Secures Your Browsing Traffic

Anonymous | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User

Overall Satisfaction with Forcepoint Web Security

We use it for our entire organization. With Forcepoint Web Security, we can be certain that the web traffic from users’ browsers will be scanned. Both plain and encrypted communications can be scanned, malware and executable programs can be filtered out, and it works transparently for the users. We have selected a number of "forbidden" categories; if they try to visit a site from that category, they will receive either a block page or a warning page.
  • Customization of configuration and block pages
  • Performance for web browsing is very good
  • Easy to troubleshoot with logging
  • Supports high available configurations (clustered setup) and virtual servers
  • Does not support web sockets, used by (e.g., WhatsApp Web, Spotify, call/video apps) unless you install client software
  • Learning curve can be steep
  • Sometimes lagging behind modern browsers (e.g., when SAN in SSL became a requirement)
  • May not support TLS 1.3 decryption fully

Do you think Forcepoint Secure Web Gateway delivers good value for the price?

Yes

Are you happy with Forcepoint Secure Web Gateway's feature set?

Yes

Did Forcepoint Secure Web Gateway live up to sales and marketing promises?

No

Did implementation of Forcepoint Secure Web Gateway go as expected?

Yes

Would you buy Forcepoint Secure Web Gateway again?

No

  • Good ROI
  • Implementation costs were high (both for us and for the partner)
  • When set up properly, it runs without us noticing it
  • Cisco Secure Firewall (formerly Firepower NGFW)
We were not yet ready to replace the firewall, so we chose a separate solution that integrates with our network. We also looked at Ironport but could not get a supported configuration (our partner did not support it).
It can be used as [an] explicit proxy, especially when combined with a proxy PAC file that lists the exceptions, and we have a lot of them (e.g., Microsoft apps like Teams). Then the exceptions will bypass the proxy and need to be able to pass through the firewall. A transparent setup should be possible, but we never got it to work reliably, [...] because this depends on [a] redirection by switches or firewalls, for which no modern protocol is being supported.