Listing Thumbnail

    Forcepoint ONE - Web Security Edition

     Info
    Forcepoint ONE - Web Security Edition brings performance and security together with a flexible, scalable SASE architecture to protect users everywhere accessing web content anywhere.This edition includes the Secure Web Gateway (SWG) along with inline protection for unlimited cloud applications and Shadow IT.

    Overview

    Forcepoint ONE is an all-in-one cloud platform that makes security simple for distributed businesses and government agencies with remote and hybrid workers. It gives employees, contractors, and other users safe, controlled access to business information everywhere - on the web, in the cloud, in private applications - keeping attackers out and sensitive data in.

    The Web Security Edition includes the Secure Web Gateway (SWG) along with inline protection for unlimited cloud applications and Shadow IT.

    Forcepoint ONE SWG brings performance and security together with a flexible, scalable architecture, that delivers a pathway to a full single-vendor SASE solution. Bring Shadow IT into the light, with in-line cloud app capabilities that provide comprehensive controls around the use of the web and cloud apps. Enforce best-in-class DLP and malware protections, with distributed enforcement that doesn't compromise performance. RBI with CDR enables Zero Trust web access for the most secure browsing experience; safe access to ANY website and ANY download.

    2024 Product Additions:

    Forcepoint Web Security Cloud: Cloud native Secure Web Gateway, protection from online security threats, filtering, acceptable-use company policy. Web Security Cloud Extended Reporting (12 months): Extends reporting data retention period from default 90 days to 12months. Forcepoint Data Protection Service: Protects sensitive data with cloud-based DLP analysis service that integrates with Forcepoint solutions. Web Security Dedicated IP: Enterprise solution providing globally available set of egress IPs for advanced MFA, cloud application security.

    Minimum User Count: The minimum user count is of 500 users. User counts for all modules and their core product must match, with the exception of Forcepoint Remote Browser Isolation. Any subscription with a user quantity less than 500 will be cancelled. Custom packaging will be offered.

    Selective RBI license covers 10% of licensed users accessing the RBI Service concurrently. For example, if subscription is for 1000 users, 500 users may connect to RBI service concurrently.

    Forcepoint ONE Add-ons for Web Security Edition

    Cloud Security Posture management Forcepoint ONE Cloud Security Posture Management (CSPM) is an optional component of the Forcepoint ONE all-in-one cloud platform that lets security and compliance personnel detect, report on, and remediate risky configurations in AWS, Azure Cloud, and Google Cloud tenants.

    SaaS Security Posture Management Forcepoint ONE SaaS Security Posture Management (SSPM) is an optional component of the Forcepoint ONE all-in-one cloud platform that lets security and compliance personnel detect, report on, and remediate risky configurations in popular SaaS including Salesforce and ServiceNow.

    Forcepoint Remote Browser Isolation RBI applies a Zero Trust approach of treating all web pages as compromised and rendering them in a remote, disposable environment, enabling people to use the web without being attacked and applies Content Disarm and Reconstruction (CDR) to downloaded documents. CDR sanitizes files as users download them to remove foreign elements, such as malware embedded in an image file using steganography.

    Notes Prices displayed are suggested end-user prices.

    Renewals: Same List Prices as below.

    For custom offers and packages please contact us: AWSPrivateOffer@forcepoint.com .

    Highlights

    • Distributed enforcement - send web traffic from sites to the Forcepoint ONE cloud for inspection and policy enforcement or deploy the unique agent-based SWG for high performance web security for remote users.
    • Unified platform - use the same DLP and malware policies across channels, from web to cloud apps to private apps.
    • Unlimited Cloud App support - Includes licensing for unlimited inline cloud app control and Shadow IT visibility.

    Details

    Categories

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Forcepoint ONE - Web Security Edition

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (8)

     Info
    Dimension
    Description
    Cost/12 months
    ONEWEB
    Forcepoint ONE - Web Security Edition (per user)
    $55.00
    ONECSPM
    Forcepoint ONE - Cloud Security Posture Management (per acct) - add-on
    $10,000.00
    ONESSPM
    Forcepoint ONE - SaaS Security Posture Management (per acct) - add-on
    $10,000.00
    FRBIS
    Forcepoint Remote Browser Isolation - Selective (per user) - add-on
    $32.00
    WBSA
    Forcepoint Web Security Cloud
    $50.00
    EDRW12X
    Web Security Cloud Extended Reporting (12 months)
    $2.00
    FDPS
    Forcepoint Data Protection Service
    $60.00
    FDIP
    Web Security Dedicated IP
    $75.00

    Vendor refund policy

    Not refundable or cancellable after purchase.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    With global facilities and highly trained technical service engineers, Technical Support offers 24/7 support for your security issues. Highly proactive support options include: frequent holistic account reviews, solution health checks, migration planning, upgrade assistance, and on-site visits. With our support, you can advance your security posture, enhance your network infrastructure, and embrace new solutions with confidence. Support |

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    100
    In Security

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Secure Web Gateway
    Cloud-native secure web gateway with distributed enforcement and policy management for web traffic inspection
    Remote Browser Isolation
    Zero Trust web browsing approach that renders web pages in disposable remote environments with Content Disarm and Reconstruction (CDR) capabilities
    Cloud Application Control
    Inline protection and visibility for unlimited cloud applications with Shadow IT detection and management
    Data Loss Prevention
    Comprehensive DLP policies that can be enforced consistently across web, cloud, and private application channels
    Security Architecture
    Flexible, scalable SASE architecture that provides comprehensive security controls with distributed enforcement mechanisms
    Zero Trust Network Access
    Provides data-centric Zero Trust Network Access (ZTNA) solution with integrated Data Loss Prevention (DLP) scanning and Remote Browser Isolation (RBI) integration
    Cloud Access Security Broker
    Protects data and stops threats across SaaS, PaaS, and IaaS environments from a single, cloud-native enforcement point with comprehensive visibility and control
    Web Traffic Inspection
    Secure Web Gateway that connects and secures workforce from malicious websites and cloud apps with integrated Remote Browser Isolation and Data Loss Prevention capabilities
    Cloud Firewall
    Monitors outbound traffic across all IP protocols and ports, applying consistent block or allow policies with inspection capabilities for HTTP and HTTPS traffic on non-standard ports
    Multi-Protocol Security Policy
    Configurable policies based on IP, host, domain, port, user, group, process, and other parameters with consistent enforcement across cloud platform
    Cloud Access Security
    Provides unified cloud access security broker (CASB) and next generation secure web gateway (SWG) with granular policy controls
    Threat Protection
    Delivers real-time data and threat protection for cloud services, websites, and private applications using contextual access understanding
    Infrastructure Security Monitoring
    Continuously assesses cloud infrastructure for misconfigurations, data exposure risks, and vulnerability detection across multiple cloud providers
    Data Loss Prevention
    Implements advanced scanning mechanisms for data-at-rest and data-in-motion to detect DLP violations and prevent unauthorized data exfiltration
    Security Policy Management
    Supports pre-defined compliance profiles for industry standards like CIS, PCI, and NIST with capabilities for custom rule creation and enterprise workflow integration

    Contract

     Info
    Standard contract
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    105 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Akshay K.

    One stop solution for Performance, Usability, and Security

    Reviewed on Jun 10, 2025
    Review provided by G2
    What do you like best about the product?
    It integrates multiple security functions into a single platform, reducing complexity and offers encryption for structured and unstructured data in SaaS and IaaS. The customer support is on point and helped in implementing the tool with ease and efficacy.
    What do you dislike about the product?
    Password changes in active directory can take around 15 minutes to reflect and this causes delays in user access.
    What problems is the product solving and how is that benefiting you?
    Zero Trust Access – This ensures secure access to applications without exposing them.
    Threat Protection - Detects and mitigates cyber threats, including phishing and malware attacks.
    JeffSimpson

    Effective web filtering blocks and reports dodgy websites quickly

    Reviewed on Mar 24, 2025
    Review provided by PeerSpot

    What is our primary use case?

    The primary use case was web filtering. My organization used Forcepoint ONE  for blocking and reporting on websites.

    What is most valuable?

    The most valuable feature was the website blocking capability, which allowed me to quickly block any dodgy websites. It was also effective at reporting the same. The product was effective for these uses.

    What needs improvement?

    There is room for improvement in making the reporting closer to real-time, ideally around five or ten minutes instead of half an hour. The interface could also be updated as it was quite dated.

    For how long have I used the solution?

    I used Forcepoint ONE  for about seven years.

    What do I think about the stability of the solution?

    I never needed to call technical support, which indicates the product was pretty stable.

    What do I think about the scalability of the solution?

    The product was scalable for the needs of my organization, although we did not experience growth during that time.

    How are customer service and support?

    I never needed to call technical support, so I experienced no issues with customer service.

    How would you rate customer service and support?

    Neutral

    Which solution did I use previously and why did I switch?

    I used Forcepoint before, but it was primarily for web filtering. The parent company that I was a part of was using it before we split off.

    How was the initial setup?

    The product was already live when I took it over, so I did not take part in the initial setup.

    What's my experience with pricing, setup cost, and licensing?

    The licensing and pricing were fine with no issues. I took over from somebody else, and it stayed as it was until we rebuilt and moved to the cloud.

    What other advice do I have?

    I am a customer. Based on my experience, I would give it an eight out of ten. I would recommend Forcepoint ONE for relatively small companies since it worked fine for us. The client was reliable once the implementation settled down.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    CarlosMendoza

    Web access categories are effectively controlled while room exists to resolve specific access needs

    Reviewed on Feb 06, 2025
    Review provided by PeerSpot

    What is our primary use case?

    I use the solution as a secure web gateway, similar to a proxy, to control access to the Internet for users. It is implemented on our equipment, such as laptops, to block certain categories like gambling and games. This is particularly important in the financial services industry where clients access the Internet through our network.

    What is most valuable?

    The control of web access by category is very effective. For example, I can access social networks but block specific platforms like Instagram and Facebook while allowing access to LinkedIn, a professional network. This helps me manage what users can access efficiently. The experience has generally been good, especially with how I can control web categories and give access to clients. It also helps me block tweets or other unwanted content.

    What needs improvement?

    I have some requirements that the solution cannot currently fulfill. For example, I need control over access to web WhatsApp, which the solution cannot resolve yet. 

    Additionally, I need to control specific functionalities within certain applications, like preventing the transfer of certain file types. This requirement is not yet resolved.

    For how long have I used the solution?

    I have had the solution for around one year. Previously, I used an on-premises version of the same product. Last year, I migrated the service to the cloud for Forcepoint ONE  web security.

    How are customer service and support?

    Customer service and tech support are rated eight out of ten. They are responsive and assist me with creating cases for any complex issues.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I previously used a solution on-premises with the same product, the first one web, before migrating to the cloud-based Forcepoint ONE .

    How was the initial setup?

    The service setup was straightforward and very easy, partly because of my prior experience with the on-premises solution. 

    I would rate the ease of setup as eight out of ten.

    What about the implementation team?

    I have a distributor here who helps with some requirements. The personnel is efficient, and I do not encounter problems with that.

    What's my experience with pricing, setup cost, and licensing?

    The pricing is very good and cheaper than other solutions like Netskope  and Forcepoint.

    Which other solutions did I evaluate?

    I have compared it to Netskope . Netskope allows certain controls like blocking WhatsApp and downloading restrictions, which are requirements for my enterprise.

    What other advice do I have?

    My overall rating for Forcepoint ONE is closer to six than seven, because of some initial setup troubles and unresolved requirements regarding WhatsApp. I recommend it as a solution that works well, however, Forcepoint needs to communicate more efficiently with its clients about changes and recommendations. 

    I would rate the overall solution six out of ten.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Other
    Ankit A.

    Insider threat catcher (Powered by AI)

    Reviewed on Jan 06, 2025
    Review provided by G2
    What do you like best about the product?
    Forcepoint Insider threat is a powerful AI detection and prevention tool for the threats within the organization and it's easy to use for any admin or analysts. It's UEBA feature is very impactful as it gives the in-depth insight of User Behaviour across every channels including endpoint, email, network, cloud etc. Detects suspicious activities along with the suspicious behavious based on the real time pattern, Also the plus point is it automatically blocks the sensitive data uploads and everything which covers the DLP features. This Product provides the Risk Score by telling how much your organisation is safe and what's the overall risk index and also suggests the various steps to improve that. If we talk about integration, then this product is the best fit for any third party integrations and also applicable in co-exist mode. For internal or SI team, this product is easy to implement.
    What do you dislike about the product?
    Personally i don't dislike this product, as forcepoint already captured huge market for their Start Product like DLP.
    What problems is the product solving and how is that benefiting you?
    This product not only benefiting me but most organisation within the globe, as this Focepoint is very known OEM. Forcepoint ITM is a great product which reduces the efforts in ivestigation and response to the real time insider threat. In today's era, most cyber crimes are hapening because of the insider employees not because of the external malicious actors.
    Yash K.

    Best web security for your users out there

    Reviewed on Dec 03, 2024
    Review provided by G2
    What do you like best about the product?
    Easy deployment, easy integration with MDM, single click installation, deployed it with good customer services, using it on daily basis
    What do you dislike about the product?
    A little but new for any professional guy, need a lil bit training for administration.
    What problems is the product solving and how is that benefiting you?
    Securing users from unusual traffic, can monitor user's activity
    View all reviews