


Lookout and Forcepoint CASB are competing in the cloud access security broker market. Lookout has the upper hand in cost-effectiveness and customer satisfaction, while Forcepoint CASB leads with its comprehensive security controls.
Features: Lookout features strong mobile threat detection, flexible policy enforcement, and a cloud-delivered architecture for scalability and ease of use. Forcepoint CASB offers granular data protection, advanced threat protection with detailed analytics, and custom policy options.
Room for Improvement: Lookout could enhance its integration with existing enterprise systems, improve its reporting capabilities, and expand its analytics features. Forcepoint CASB might optimize ease of use, streamline its deployment processes, and reduce the complexity of its customization options.
Ease of Deployment and Customer Service: Lookout is praised for straightforward setup and efficient support. Forcepoint CASB, with its extensive customization, may require complex deployment efforts but offers dedicated support for initial challenges.
Pricing and ROI: Lookout provides competitive pricing focusing on value and rapid ROI through efficient threat protection. Forcepoint CASB, requiring a more significant initial investment, supports its value with comprehensive security offerings appealing for in-depth threat management.
| Product | Market Share (%) |
|---|---|
| Forcepoint CASB | 1.4% |
| Prisma Access by Palo Alto Networks | 14.4% |
| Netskope | 14.4% |
| Other | 69.8% |
| Product | Market Share (%) |
|---|---|
| Lookout | 19.8% |
| Zimperium | 26.9% |
| Check Point Harmony Mobile | 11.9% |
| Other | 41.4% |

| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 6 |
| Large Enterprise | 5 |
| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 2 |
| Large Enterprise | 3 |
| Company Size | Count |
|---|---|
| Small Business | 2 |
| Large Enterprise | 5 |
Iboss offers a comprehensive cloud-based security platform valued for its scalability and autonomous features, ensuring robust security with easy deployment and management capabilities.
Renowned for its robust security architecture, Iboss integrates seamlessly within diverse networks, delivering efficient granular filtering and advanced content categorization. Its single pane of glass console provides ease of management, allowing rapid scalability suitable for rapidly deploying environments. Operates in BYOD setups due to inline filtering without device installation. Integration with cloud-based applications enhances user control, and features like SASE, SSL inspection, and ChatGPT risk protection stand as highlights. Despite its strengths, users have pointed out areas for enhancement like direct navigation in reports, SSL decryption, and better cloud integration while having room to improve data loss prevention.
What are the most important features of Iboss?The usage of Iboss spans educational institutions, specifically K-12, to enforce internet policies, protect data, and support remote work environments. It provides web filtering and security frameworks to ensure safe browsing. Its platform-as-a-service model offers flexibility for both cloud-based and on-premises requirements, integrating seamlessly to deliver enhanced security features suitable for various deployment needs including zero trust, CASB, and network security for work-from-home setups.
Forcepoint CASB (Cloud Access Security Broker) is a security solution which is designed to secure and monitor the use of cloud services within an organization. It helps organizations gain visibility and control over the cloud applications and services being used by their employees. Forcepoint CASB integrates with cloud service providers' APIs and employs various techniques such as traffic analysis, proxying, and API-based controls to provide security and visibility into cloud application usage. It can be deployed as a standalone solution or integrated with other security technologies within an organization's existing infrastructure.
Forcepoint CASB Features:
Forcepoint CASB Benefits:
Reviews from Real Users
Edwin Eze Osiago, Regional Solutions Manager (Sub-Sahara Africa) at InfodataReliable, says that Forcepoint CASB is "Easy to set up and offers good visibility".
PeerSpot user, Professional Services Coordinator at a tech vendor, writes that Forcepoint CASB "Needs better backend code, requires stronger technical support, and the initial setup should be easier" and also adds that "The most valuable aspect for us is the fact that the product seamlessly integrates with the Forcepoint DLP".
Mahendra Bedre, Lead at Infrastructure Solutions ALM, says that Forcepoint CASB's "Macro integration and IDs for credentials are great features; It is easy to use with a good layout".
Lookout’s mobile EDR solution goes beyond traditional endpoint solutions by addressing the unique architecture, behaviors, and risks of iOS and Android devices. It provides industry-leading mobile threat defense on employee devices while also granting security teams the visibility and actionability needed to align mobile risk with traditional endpoint risk. By leveraging the world's largest AI-driven mobile security dataset, Lookout utilizes artificial intelligence (AI) and behavioral analysis to detect threats before they escalate, ensuring comprehensive protection for sensitive data and enabling secure mobile productivity.
Recognizing that employees using mobile devices are the new frontline, attackers are increasingly employing sophisticated social engineering techniques like phishing and smishing. These tactics exploit basic human instincts—trust, curiosity, and urgency—to trick users into revealing sensitive credentials, allowing threats to bypass traditional legacy security solutions. To combat this, Lookout provides AI-first protection against advanced social engineering attacks, device compromises, vulnerabilities, mobile malware, network threats.
We monitor all Cloud Access Security Brokers (CASB) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.