I use Forcepoint ONE to protect sensitive data, enforce security and compliance policies, and ensure secure access to cloud applications, web resources, and endpoints. It enables me to monitor user activity, detect and prevent unauthorized data sharing, enforce access controls based on roles, devices, or locations, and secure interactions across cloud and web platforms. Additionally, it helps safeguard against malware, phishing, and other threats, providing comprehensive visibility and control over the organization’s IT environment while maintaining compliance and reducing risk.
Forcepoint ONE - Web Security Edition
ForcepointExternal reviews
External reviews are not included in the AWS star rating for the product.
Bundled security has reduced costs and staffing needs but support and hybrid migration need work
What is our primary use case?
How has it helped my organization?
Forcepoint ONE has significantly improved our data security by preventing unauthorized access and the sharing of sensitive information. It provides clear visibility into user activity across endpoints, cloud applications, and web resources, allowing me to detect and respond to potential risks quickly. The platform enforces security and compliance policies consistently across the organization, helping us maintain regulatory adherence. It also streamlines monitoring and management, reduces operational overhead, and enhances our overall security posture, giving the team confidence that critical data and systems are well protected.
What is most valuable?
Forcepoint ONE offers Zero Day Trust Network Access, DLP, and Data Loss Prevention as the best features. Zero Day Trust Network Access and DLP features help my team significantly in daily operations by assigning trust to users. Zero Day Trust Network Access provides access to network, cloud apps, network endpoints, and related resources. DLP also helps in preventing users from uploading or taking sensitive data outside the environment.
Forcepoint ONE has positively impacted my organization in a very good way. I can share a specific example of measurable outcomes where Forcepoint ONE made a difference, particularly regarding cost reduction because all the features that Forcepoint ONE bundles are in one package, as opposed to other solutions where you have to buy every single module individually.
What needs improvement?
Forcepoint ONE could be improved in terms of scalability to better support hybrid environments, as many organizations still operate partially on-premises while gradually moving to the cloud. Enhancing its ability to handle such mixed setups would make migrations smoother and adoption easier. Additionally, customer support could be strengthened by prioritizing enterprise license holders and addressing critical issues more promptly, ensuring faster resolution and a more reliable overall user experience.
For how long have I used the solution?
I have been using Forcepoint ONE for one year.
What do I think about the stability of the solution?
Forcepoint ONE is very stable.
What do I think about the scalability of the solution?
Its scalability is very good, and it can handle a high workload.
How are customer service and support?
Customer support is very good, but it can be better.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I did not use any solution before.
What about the implementation team?
My experience with pricing, setup cost, and licensing was very good. It was a very seamless experience. Forcepoint salespeople helped me to achieve a seamless deployment, and it was good.
What was our ROI?
I have seen a return on investment, and the improvement is very good. Money saved is evident because the license for Forcepoint ONE is a bundled package. Time saved is also noticeable because more incidents are handled and reviewed in a short period of time. Additionally, I have fewer employees because Forcepoint ONE does the work that I used to rely on a team of engineers to previously detect.
Which other solutions did I evaluate?
I did not evaluate other options before choosing Forcepoint ONE.
What other advice do I have?
I advise others looking into using Forcepoint ONE to study its features, as it covers many of the use cases usually associated with customers looking into solutions like this. I would rate this product a 7.
Strong data protection has secured remote work and now prevents risky web and cloud access
What is our primary use case?
My main use case for Forcepoint ONE is securing cloud and web access by protecting users, data, and applications anywhere while enforcing consistent security policies.
A specific example of how I use Forcepoint ONE to secure cloud or web access for my users is that I use DLP to prevent sensitive files from being uploaded to personal cloud storages externally via web apps. I also use SWG, which is Secure Web Gateway, to block access to risky websites and malware-laden content while allowing safe browsing. Additionally, I use CASB to monitor and control how users access cloud apps such as Office 365, Google Workspace, and similar services. Furthermore, threat protection detects and blocks malware and phishing attempts from web or cloud sources in real-time.
What is most valuable?
The best features that Forcepoint ONE offers include DLP, Zero Trust Network Access, Secure Web Gateway, CASB, Cloud Access Broker, and real-time threat protection. I really enjoy these features for enabling secure, policy-driven access to cloud and web resources anywhere.
The DLP feature stands out in Forcepoint ONE because it actively monitors and protects sensitive data across cloud apps, email, and web traffic. It prevents accidental and intentional leaks, enforces policies consistently, and ensures compliance with regulations, all without disrupting user productivity. It is very important because it hardly interferes with user productivity due to its silent operation; even alerts to users are gentle reminders that a policy was breached, so overall, it does not impact productivity.
Forcepoint ONE has positively impacted my organization by securing data, strengthening our security posture, preventing data leaks, blocking risky web activity, and controlling access to cloud apps. It has also reduced security incidents, ensured regulatory compliance, and allowed users to work safely from anywhere, both remote and on-premises.
What needs improvement?
Forcepoint ONE can be improved if the admin interface is more streamlined for faster policy management, the reporting dashboard is enhanced for deeper insights, integration with additional cloud apps is expanded, and deployment and monitoring is simplified.
For how long have I used the solution?
I have been using Forcepoint ONE for approximately one and a half years.
What do I think about the stability of the solution?
From my experience, Forcepoint ONE is stable; it runs reliably across endpoints and cloud environments and is consistent with policy enforcement with minimal downtime.
What do I think about the scalability of the solution?
Forcepoint ONE's scalability is very good; its cloud-based architecture allows us to easily add users, endpoints, and cloud apps without impacting performance, making it suitable for growing organizations.
How are customer service and support?
Customer support for Forcepoint ONE is generally responsive and helpful, providing timely guidance for deployment, troubleshooting, and policy configuration, ensuring minimal disruption to our operations.
How would you rate customer service and support?
Negative
Which solution did I use previously and why did I switch?
We previously used a traditional on-premises security solution that lacked cloud visibility and flexible remote access, so switching to Forcepoint ONE provided us with centralized cloud and web security with better policy enforcement and threat protection.
How was the initial setup?
The pricing, setup, and licensing of Forcepoint ONE are very straightforward, and the subscription model is very flexible, allowing us to scale user licenses as needed, while the setup is mostly cloud-based, requiring minimal on-premises infrastructure and providing clear guidance for deployment.
What was our ROI?
We have seen a clear return on investment with Forcepoint ONE, including metrics such as a 40% reduction in accidental data leaks, over 95% of risky web access blocked, fewer overall security incidents, and improved compliance, resulting in lower remediation costs and improved operational efficiency.
Which other solutions did I evaluate?
Before choosing Forcepoint ONE, we evaluated several solutions, including other CASB and SWG providers, and Forcepoint ONE stood out because of its comprehensive cloud and web security, strong DLP, and seamless integration across enterprise and cloud apps.
What other advice do I have?
Zero Trust Network Access provides secure conditional access to corporate apps without exposing the network.
I would advise others looking into using Forcepoint ONE to clearly define their data protection and cloud access requirements upfront, involve stakeholders from IT, and take advantage of Forcepoint ONE's DLP and ZTNA features to maximize security while keeping user experience smooth.
Forcepoint ONE is a robust, cloud-first security solution that effectively balances strong data protection with user accessibility, and its modular features allow organizations to tailor security policies as they grow. I would rate this solution an 8 out of 10.
Delivers reliable policy control and improves data protection across cloud and endpoints
What is our primary use case?
My main use case for Forcepoint ONE is delivering data loss prevention and data protection to help customers comply with corporate or regulatory data protection requirements such as PII protection, and I also use it to prevent data leaks through web uploads, cloud storage, and email, while monitoring and controlling sensitive data transfer from managed endpoints.
From a vendor perspective, Forcepoint ONE helps us deliver centralized data protection for multiple clients under a single management framework, reducing operational overhead and providing visibility into how sensitive data moves across different channels, and it is essential for compliance and data governance.
No other use case for Forcepoint ONE comes to mind.
What is most valuable?
The best features Forcepoint ONE offers include the DLP engine with predefined policies for common data types that help us determine and use it directly, as well as cloud app control to protect SaaS platforms like Microsoft 365 and Google Workspace. We are also helped by the Incident Management Dashboard for quick review and policy tuning, along with integration with Forcepoint Endpoint DLP, allowing us consistent enforcement across devices.
The DLP engine and Incident Management Dashboard have made our work much more efficient in daily operations, as detection accuracy reduces the need for manual review, and the centralized dashboard helps us quickly identify which incidents need escalation or policy adjustment. It shortens response time for our clients, allowing their security team to view incidents in real-time, classify them easily, and focus on genuine risks instead of sorting through false positives, and it simplifies reporting and audit preparation since all the relevant data is consolidated in one place.
One feature that really stands out for us and our client is the seamless integration between Forcepoint ONE and the on-premise Forcepoint DLP, as it allows consistent data protection policy across both cloud and endpoint environments, making it much easier to manage.
Forcepoint ONE has positively impacted our organization by streamlining DLP policy management and reducing time spent on troubleshooting and manual reviews, providing faster compliance reporting for internal needs and compliance with local regulation, and improving visibility into how sensitive data moves across cloud and endpoint environments. Overall, it helps our customers operate more efficiently and confidently in enforcing data protection controls.
What needs improvement?
Overall, Forcepoint ONE performs well, but I think the dashboard could be made more intuitive, and the policy synchronization between cloud and on-prem components could also be faster and more transparent, alongside having more flexible reporting and alert customization to tailor insights for different clients and compliance needs.
It would be more helpful to have better integration documentation for complex hybrid deployments.
For how long have I used the solution?
I have been working in my current field for five months, and for Forcepoint ONE specifically, my hands-on experience is two months.
What do I think about the stability of the solution?
I think Forcepoint ONE is pretty stable, as the connection and agent synchronization are reliable, but it can still be improved.
What do I think about the scalability of the solution?
Forcepoint ONE offers good scalability overall, as it is a cloud-native SSE platform built on a multi-tenant architecture. It can easily scale to support thousands of users and devices without requiring major infrastructure changes, and from what I've seen while supporting clients, performance remains stable as the environment grows, whether that's adding more endpoints, expanding DLP coverage, or integrating with additional SaaS apps.
How are customer service and support?
Customer support has been responsive and professional in my experience, as the Forcepoint support team usually replies within a reasonable timeframe and provides clear guidance for troubleshooting. Having a local principal support available also helps speed up communication and coordination, especially for urgent or region-specific cases.
I would rate customer support 8 out of 10, as they are generally responsive and helpful when we open tickets, and having a local principal team really helps with faster issue resolution. There is still room for improvement in response time during complex cases, but overall, the experience has been positive and reliable.
How would you rate customer service and support?
Positive
What was our ROI?
Since I'm on the technical side, I don't handle ROI or financial metrics directly, but based on client feedback, many have seen improvements in operational efficiency mainly through centralized policy management and reduced manual investigation time, resulting in time savings and better visibility across their environments.
What other advice do I have?
My advice would be to clearly define your data protection goals before deployment and take time to properly configure policies that match your organization workflows. Forcepoint ONE is a powerful platform, especially when integrated with DLP and CASB capabilities, but it works best when you plan your deployment architecture early, whether for endpoints, cloud apps, or web channels, and also ensure to involve both IT, security, and business teams so the protection policies don't interfere with productivity.
On a scale of 1-10, I rate Forcepoint ONE an 8.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Comprehensive Security Made Simple, but Setup Can Be Challenging
One stop solution for Performance, Usability, and Security
Threat Protection - Detects and mitigates cyber threats, including phishing and malware attacks.
Effective web filtering blocks and reports dodgy websites quickly
What is our primary use case?
What is most valuable?
What needs improvement?
For how long have I used the solution?
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
How are customer service and support?
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
How was the initial setup?
What's my experience with pricing, setup cost, and licensing?
What other advice do I have?
Force point as a data leak prevention
Complete security solution with flexible cloud availability
Very effective email security gateway
Comprehensive protection against internal risks
Covers wide range of endpoints and platforms, ensuring thorough monitoring.
Detailed logging and investigation tool helps in understanding the full scope of incidents.
It detects unintentional actions by insiders that could lead to data breaches, such as mishandling sensitive information.
Monitors and prevents unauthorized attempts to transfer sensitive data outside the organization, by means of email, USB drive.