Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

0 AWS reviews
  • 5 star
    0
  • 4 star
    0
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

105 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Information Technology and Services

Helps to protect organisations data

  • July 31, 2024
  • Review provided by G2

What do you like best about the product?
The solution is effective in preventing data exfiltration by monitoring and controlling data transfers, both within the organization and to external sources
What do you dislike about the product?
Mac data transfer through airdrop is not detecting
What problems is the product solving and how is that benefiting you?
Helps to protect organisation data,
Data transfer will be recorded internal and external


    Airlines/Aviation

Forcepoint Data Loss Prevention (DLP)

  • July 30, 2024
  • Review provided by G2

What do you like best about the product?
With Forcepoint Insider Threat, you can save time and effort as it automatically scores and prioritizes your riskiest users, eliminating the need to go through thousands of alerts.
What do you dislike about the product?
It's a reliable tool, but the free features have some restrictions. If you're looking to unlock the more advanced options, you'll need to invest some additional money.
What problems is the product solving and how is that benefiting you?
This solutin is addressing human-centric risk with great visibility and control where you have your manpower work and use the data they need to be operatinal.


    Vishal R.

A deep dive into Forcepoints insider threat detection

  • July 26, 2024
  • Review provided by G2

What do you like best about the product?
It has very comphrensive monitiring also offeres a high degree of customization.
Easy to use and implementation.
What do you dislike about the product?
Extesive monitoring capabilities may impact system performance.
What problems is the product solving and how is that benefiting you?
It is very helpful to monitors uses activitiesacross endpoints, and cloud enviornments.


    Anurag P.

Forcepoint Data Guard Review

  • April 05, 2024
  • Review provided by G2

What do you like best about the product?
One of the best DLP solution offer by forcepoint. It is ease of use and very easy to implement we have been continously doing testing and looking forward to have it in our product bucket. Integration is easy to be done and support also gives an full time assistance if there is an issue regarding the product implementation
What do you dislike about the product?
Until now there is no issue only we find little complex during scaling the environment
What problems is the product solving and how is that benefiting you?
Main thing is it helps in DLP along with that we have an complaince policies, insider threat detection and operation efficiency.


    Darshan T.

Forcepoint Data Guard Review

  • April 02, 2024
  • Review provided by G2

What do you like best about the product?
Forcepoint Data Guard has a very decent user interface. What I like best is the flexibility, scalability, integration, training and support, and real-time monitoring and reporting.
What do you dislike about the product?
Forcepoint Data Guard sometimes generate false positives, flagging legitimate activities or files as security risks.
What problems is the product solving and how is that benefiting you?
Forcepoint Data Guard solving our Data Loss Prevention (DLP) problems and benefits by preventing data breaches and leakage by monitoring and controlling the flow of sensitive data within an organization.


    Anjani Kumar

Provides centralized system monitoring and has a valuable feature for data protection

  • March 20, 2024
  • Review provided by PeerSpot

What is our primary use case?

The primary use case of the product is to ensure security and protection in a SASE (Secure Access Service Edge) environment. It serves multiple purposes, including securing roaming users and protecting users accessing resources outside the office. Another key aspect is safeguarding Insight applications using ZTE (Zero Trust Exchange) and preventing data leakage. In daily operations, it is primarily utilized through ZPA (Zero Trust Network Access), ensuring users have secure access to the internet. It involves protecting corporate devices from advanced threats and malicious sites and enforcing data isolation policies to prevent unauthorized data access or leakage. Additionally, the solution facilitates the secure transfer of sensitive data through various applications like Dropbox, utilizing policies set within the SSE (Secure Web Gateway) solution, potentially incorporating a model such as CASB (Cloud Access Security Broker).

What is most valuable?

The most valuable features of Forcepoint include Zero Trust Network Access and remote user protection for private applications. These features prioritize data security regardless of the user's location, ensuring that data is always protected. In terms of threat defense, the thread detection feature stands out as particularly valuable. It includes various capabilities such as web isolation to isolate unknown static, blocking access to malicious sites, and employing intelligence-driven checks based on configured policies. Integrating third-party sandboxing further enhances threat detection and response capabilities, providing comprehensive protection against advanced threats. It collectively contributes to a robust defense mechanism, safeguarding organizations against various security threats.

What needs improvement?

Areas for improvement for the platform include addressing scalability and architecture concerns, especially for large deployments involving more than 500 or 1,000 users. 

Additionally, integrating sandboxing features directly into the solution, either on-premise or in the cloud, is crucial for comprehensive threat detection and response. It would eliminate the need to rely on third-party sandboxing solutions, streamlining security operations and enhancing overall efficiency and effectiveness in combating threats.

For how long have I used the solution?

We have been using Forcepoint ONE for 14 months.

What do I think about the stability of the solution?

Regarding stability, I have confidence in Forcepoint's technology and its ability to perform well in the market. However, being hosted on AWS has its architectural challenges, as is typical with any cloud-based solution. While it has the potential to overcome these challenges and further enhance its capabilities, it's important to acknowledge the inherent complexities that can arise in a public cloud environment.

What do I think about the scalability of the solution?

We have around 5,000 Forcepoint ONE users. Scalability is one of the product's notable strengths. Its architecture facilitates rapid scalability, particularly its polytexture architecture deployed on AWS. Spinning a virtual machine (VM) in any location is almost instantaneous. It gives it an edge over solutions like Zscaler, which may require setting up entire private data centers for expansion. While Forcepoint's scalability advantage is evident, it still faces challenges inherent to its architecture.

By consolidating multiple security functions into a single client, particularly incorporating Data Loss Prevention (DLP) and Secure Web Gateway (SWG) functionalities, Forcepoint has streamlined our security infrastructure.

How are customer service and support?

Resolving issues has sometimes taken longer than expected. While the initial response time has been problematic, support effectiveness improves upon escalation.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We previously used a different solution before transitioning to Forcepoint. The decision to switch was driven by various factors, including the need for improved sandboxing capabilities, especially regarding onboarding. Additionally, Forcepoint's deployment in a public cloud environment posed challenges for organizations needing to utilize AWS, such as those favoring the Google Cloud Platform. This discrepancy in cloud provider compatibility influenced the decision to transition to a solution that aligns better with our organization's cloud infrastructure preferences and requirements. 

How was the initial setup?

The initial setup was straightforward, primarily because everything was managed from the Forcepoint side, requiring no additional maintenance efforts. Deployment was relatively simple, especially when the organization clearly understood its objectives and requirements. The process took little time as long as the objectives were well-defined. However, if the organization needs to be clearer about its needs, it could prolong the setup process. In general, the technology was simple, and anyone could become proficient in managing it properly. Therefore, while the setup could vary depending on the clarity of objectives, the technology itself was relatively easy to implement.

What other advice do I have?

Integrating services within Forcepoint has significantly enhanced our organization's security posture by enabling seamless authentication, centralized monitoring, comprehensive data correlation, and compatibility with third-party technologies. It ensures streamlined access management, proactive threat detection, informed decision-making, and cohesive security operations, ultimately fortifying our defenses against advanced threats and maintaining a proactive security stance.

Its data protection capabilities have greatly benefited our organization by providing comprehensive protection for our intellectual property and sensitive data. With Forcepoint, users accessing corporate applications and the internet are shielded from accessing malicious sites or falling victim to threats. It ensures that our data remains secure, whether in motion, use, or rest. It safeguards against data leakage, whether intentional or unintentional, by monitoring and controlling data transfer through various channels such as private apps, public SaaS applications, or third-party emails.

Forcepoint ONE shows significant potential for improvement while still being a commendable product. I would give it around an eight out of ten.


    reviewer2203710

Provides valuable data protection features, but there could be essential information available for understanding the functionality

  • February 22, 2024
  • Review provided by PeerSpot

What is our primary use case?

Forcepoint ONE's primary use case involves safeguarding the browsing activities of users who bring their laptops home. Specifically, we aim to protect their internet navigation while in their residences. Additionally, we need to secure specific applications to ensure that sensitive data and resources remain protected.

What needs improvement?

While we have some product information available, there are instances where we need a comprehensive understanding of all the features. We encounter challenges in determining whether certain features for blocking certain file types or preventing automatic downloads are functioning correctly. These particular areas need improvement.

What do I think about the stability of the solution?

We require high availability of 99.9%, and we believe the platform can effectively meet this requirement.

What do I think about the scalability of the solution?

I rate the scalability of Forcepoint ONE as around seven. It was easy to scale, but as we expand our user base and deployment, we anticipate the need for further exploration and optimization. We expect it to be scalable, but we have yet to deploy the solution fully.

How was the initial setup?

The initial setup was easy to deploy. However, configuring certain features presented challenges.

What other advice do I have?

The platform's feature that has been most beneficial for our web security is its capability to replicate rules. This functionality allows us to maintain consistent navigation policies for users, even when they transition between working from home and in the office. By replicating rules, we can effectively extend our border access control.

With the data protection features, we have noticed a considerable improvement in our control over security incidents. Specifically, we have enhanced control over blocking malicious applications and preventing access to websites with a poor reputation.

I recommend Forcepoint ONE to others. It's a simple and highly useful solution, albeit with room for improvement in certain features, such as application blocking. For instance, blocking applications like Skype, Teams, WhatsApp, or similar could be enhanced.

I rate it a seven out of ten.


    Ankush G.

Forecepoint Data Analyzer: A Breif Review

  • December 25, 2023
  • Review provided by G2

What do you like best about the product?
This is the best tool which is used to analyize cross domain security. Also it is very easy to integrate within the organization and this tool has helped my team to be more productive.
What do you dislike about the product?
The price is one factor which i don't like. Also the customer support could be improved. There are long delays in response from their customer support.
What problems is the product solving and how is that benefiting you?
It helps my organization in detecting data breaches by providing me a comprehensive view of my sensitive data.


    Mohan S.

Force point data Analyzer: A comprehensive tool to have in tool kit

  • December 19, 2023
  • Review provided by G2

What do you like best about the product?
Easy to configure. Simple user interface. It's integration with various products was good. It helped our team to be productive
What do you dislike about the product?
I just started to use this tool. As if now I didn't find any issues. I would like know how the support team in my journey with this tool.
What problems is the product solving and how is that benefiting you?
We are building cybersecurity tool it help us in analysis part


    ABHISHEK A.

Data Analyzer

  • December 12, 2023
  • Review provided by G2

What do you like best about the product?
It provide good insights in getting Insights.
What do you dislike about the product?
Bit outdated in some department to analyze
What problems is the product solving and how is that benefiting you?
It is a data loss prevention (DLP) solution designed to address various challenges related to the protection and management of sensitive data within an organization.