No more typing reviews! Try our Samantha, our new voice AI agent.

Forcepoint ONE vs Menlo Secure comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 4, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

iboss
Sponsored
Ranking in Secure Web Gateways (SWG)
6th
Average Rating
8.4
Reviews Sentiment
6.9
Number of Reviews
22
Ranking in other categories
Internet Security (3rd), Web Content Filtering (1st), Cloud Access Security Brokers (CASB) (7th), ZTNA as a Service (8th), Secure Access Service Edge (SASE) (8th)
Forcepoint ONE
Ranking in Secure Web Gateways (SWG)
9th
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
20
Ranking in other categories
Cloud Access Security Brokers (CASB) (10th), Secure Access Service Edge (SASE) (11th)
Menlo Secure
Ranking in Secure Web Gateways (SWG)
26th
Average Rating
9.2
Reviews Sentiment
6.7
Number of Reviews
5
Ranking in other categories
Firewalls (51st), ZTNA (24th), Cloud Security Remediation (9th)
 

Mindshare comparison

As of May 2026, in the Secure Web Gateways (SWG) category, the mindshare of iboss is 3.3%, up from 2.0% compared to the previous year. The mindshare of Forcepoint ONE is 1.6%, up from 1.6% compared to the previous year. The mindshare of Menlo Secure is 2.2%, up from 1.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Secure Web Gateways (SWG) Mindshare Distribution
ProductMindshare (%)
iboss3.3%
Forcepoint ONE1.6%
Menlo Secure2.2%
Other92.9%
Secure Web Gateways (SWG)
 

Featured Reviews

Ashok Ananthula - PeerSpot reviewer
Senior Consultant Proxy Engineering at a financial services firm with 10,001+ employees
Cloud gateway has strengthened remote web security and now needs better Mac and ISP support
The problem our organization had is that iboss failed for the Mac devices. It is not able to give a successful agent for the Mac agents. That is where in 2025, we had to migrate to the Palo Alto-based platform. If your use case is for just Windows laptops,you can consider this platform as an option One issue is the data center resiliency part. In India especially, they are not tied up with the Tier 1 ISPs like Tata or Airtel; they were having Tier 2 ISPs and encountered many issues reaching few major sites that my organization depends on, and they were having problems that they could not fix quickly. They also lack a mechanism to route that traffic within their data center; rather, they ask customers to make a pac file change to route it to Singapore explicitly. It would be better if they route from their backend , i mean even if I send it to India DC, they should be able to route it internally to make that work; however, they fail to do that and ask the customer to route it in the pac file. Another suggestion is that in China, they do not have the proper setup; they used to have numerous problems with slowness and lack of premium circuits in China as well. That leads to multiple sites working slowly with latency-related issues. So the main issue is the ISP-related problems that need to be solved.
reviewer2765397 - PeerSpot reviewer
Security Engineer at a tech services company with 201-500 employees
Delivers reliable policy control and improves data protection across cloud and endpoints
The best features Forcepoint ONE offers include the DLP engine with predefined policies for common data types that help us determine and use it directly, as well as cloud app control to protect SaaS platforms like Microsoft 365 and Google Workspace. We are also helped by the Incident Management Dashboard for quick review and policy tuning, along with integration with Forcepoint Endpoint DLP, allowing us consistent enforcement across devices. The DLP engine and Incident Management Dashboard have made our work much more efficient in daily operations, as detection accuracy reduces the need for manual review, and the centralized dashboard helps us quickly identify which incidents need escalation or policy adjustment. It shortens response time for our clients, allowing their security team to view incidents in real-time, classify them easily, and focus on genuine risks instead of sorting through false positives, and it simplifies reporting and audit preparation since all the relevant data is consolidated in one place. One feature that really stands out for us and our client is the seamless integration between Forcepoint ONE and the on-premise Forcepoint DLP, as it allows consistent data protection policy across both cloud and endpoint environments, making it much easier to manage. Forcepoint ONE has positively impacted our organization by streamlining DLP policy management and reducing time spent on troubleshooting and manual reviews, providing faster compliance reporting for internal needs and compliance with local regulation, and improving visibility into how sensitive data moves across cloud and endpoint environments. Overall, it helps our customers operate more efficiently and confidently in enforcing data protection controls.
reviewer2701794 - PeerSpot reviewer
Head Of Bluechip Enterprise at a manufacturing company with 51-200 employees
Provides strong protection and multiple use cases but struggles with market recognition
There aren't specific areas for improvement; however, they're not as well known as the big vendors such as Palo Alto. Menlo Secure is a smaller company with limited resources and funding, which makes it challenging to compete with larger companies such as Palo and Cisco. What can be improved is market awareness and adoption of the technology. When selling it in the channel, regardless of how good the technology might be, success depends more on market adoption and awareness.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"iboss is among the few products providing inline filtering where no application is needed on the device."
"The security aspect of the solution, particularly the malware behind it, is excellent. That's something that really helped us out. It's not just a simple proxy that just blocks the insights of potential threats that come on behind it. They do malware detection and that helps us a lot."
"I would rate the technical support of iboss a solid 10 without a shadow of a doubt."
"The solution has massively improved our security posture, giving us full visibility into what our staff does online."
"iboss is among the few products providing inline filtering where no application is needed on the device. It operates on the network side and is not device-based. This feature was one of the main reasons why we stayed with them for so long."
"The security aspect of the solution, particularly the malware behind it, is excellent."
"Our primary use case for this product is DLP,"
"Technical support is pretty sharp and very responsive."
"The most valuable feature was the website blocking capability, which allowed me to quickly block any dodgy websites."
"Forcepoint ONE has positively impacted our organization by providing visibility through CASB, caching user activities, and preventing threats by guiding users to the correct cloud services like Office 365 instead of blocking access to more vulnerable services."
"Forcepoint ONE has positively impacted our organization by streamlining DLP policy management and reducing time spent on troubleshooting and manual reviews, providing faster compliance reporting for internal needs and compliance with local regulation, and improving visibility into how sensitive data moves across cloud and endpoint environments."
"The most valuable features of Forcepoint include Zero Trust Network Access and remote user protection for private applications."
"The core CASB solution is the most valuable part. It allows us to put policies in place around which devices can log into our cloud applications. We have a policy that states that only company devices can access these cloud applications."
"The solution is very good when it comes to securing us against data leakage, because of the other proxy. It also has API scanning or data at rest. It inspects data in motion, which is the proxy, and then it has the data at rest, which is the API scanning. We can inspect for anything we want: file fingerprinting, PHI-sensitive data, PCI-sensitive data. It does not matter. We can usually find it and block it in transit and do our remediation with it. It could either be block, encrypt, or allow and watermark the file to follow it and see where it goes. It allows for those different scenarios."
"It is overall a good solution for securing against data breaches and attacks, but there is no 100 percent guarantee in software."
"With everything that I know about Bitglass and working with the organization as a whole, such as meeting the CEO on down through new folks, they have a fantastic culture and ethic when it comes to the customer first."
"Either you have access to something or don't have access to it, and if you do, we can ensure, 100 percent of the time, that there is nothing malicious that is going to impact our system in any way."
"For us, the primary goal is protection on the web, and that's extremely important. We're not using any of the other services at this time. The web part is key to the success of the organization. It gives us the ability to protect. It can isolate. It opens the session in an isolated format so that the code isn't running locally. It is running over in the Menlo environment, not in ours. It is not running on the local computer, whereas if you were to go to a normal website, it would run Java or something else on the local machine and potentially execute the malicious code locally. So, it does give us that level of protection."
"This security technology addresses risk and enables people to conduct business without that risk, which is where the ROI is realized."
"Accessing the internet with a proxy from anywhere is the most valuable feature. It ensures that users are only able to browse legitimate websites. If they happen to go to a legitimate website with a malicious payload, the isolation feature will take care of that."
"It has reduced security events to follow up on. While it is not 100%, there has been probably a 90% or more reduction. We were getting hit left, right, and center constantly from people browsing the Internet and hitting bad websites. It was not just bad websites that were stood up to be malicious, but good sites that were compromised."
"The fact that it is a cloud proxy solution is another feature we like. For example, if you acquire a new company, you can use it to protect that new company without the need to install anything physically on their networks."
"We are not aware of a single compromise from the web since implementing the solution."
"The solution is invisible to our end users, so it doesn't have any impact on their work or performance."
 

Cons

"I am currently doing a PoC of the zero trust aspect of it. Compared to other similar solutions, it is hard to get around each feature. It takes a while to get used to it."
"The area I would like to see improvement in is the ability within the reporter to navigate directly to the content the user is traversing."
"Sometimes when you call in support, you get someone who is just following a sheet. It feels like a runaround. You feel that you are running into that support wall."
"Our biggest problem with their service was it did not recognize the device and filtering did not always work correctly."
"Fold that in with the risk intelligence they're getting from all of the different subscriptions they are a part of. Now, these security companies subscribe to things like emerging threats, databases, etc. You can fold all this intelligence to decide what's happening on an endpoint. I would love to see them start moving into that space. That would compete directly with Microsoft. Maybe that's why they haven't. Having that ability native within the solution would be great. The other area in which I would love to see improvement is more detailed descriptions of why they block websites."
"SSL decryption: We had issues with learners using apps instead of using web browsers."
"Our biggest problem with their service was it did not recognize the device and filtering did not always work correctly."
"The reporting feature needs improvement."
"I wish they would advance more into the endpoint DLP solution. Currently they do not do anything around endpoint, they're still strictly cloud-based. The forward proxy is really the only thing they do. What I would like to see them do is to scan machines, workstations and servers, for information we might not want on those machines. That would be huge."
"Integration into different multi-factor authentication tools. On their page, they tout Duo, but I don't use Duo. I use another vendor. Not that they don't interact, but it takes a little bit more doing. Any amount of efficiencies here would help."
"There is room for improvement in making the reporting closer to real-time, ideally around five or ten minutes instead of half an hour. The interface could also be updated as it was quite dated."
"Forcepoint ONE could be improved."
"Forcepoint ONE can be improved in scalability to handle more hybrid environments."
"In our environment, when an Active Directory password changes, we tend to have some latency issues with access. It takes about 15 minutes before that password is accessible through Bitglass after the change."
"We encounter challenges in determining whether certain features for blocking certain file types or preventing automatic downloads are functioning correctly."
"I rate Forcepoint ONE a seven because it needs improvement in reporting and integrations."
"We are now transitioning to another solution. The main reason for that is that managing all of the exceptions and troubleshooting all of the issues our users have had connecting to the internet has become too significant in terms of workload, compared to what we hope we will have with another solution."
"In the best of all worlds, we wouldn't have to make any exceptions. However, that is a big ask because a lot of that depends on how websites are constructed. For example, there are some very complex, application-oriented sites that we end up making exceptions for. It is really not that big an issue for us to make the exceptions. We feel like we are doing that without a huge impact on our security posture, but we do have to make some exceptions for complex sites, e.g., mostly SaaS-type sites and applications."
"The user monitoring could still be improved."
"Menlo Secure is a smaller company with limited resources and funding, which makes it challenging to compete with larger companies such as Palo and Cisco."
"In the best of all worlds, we wouldn't have to make any exceptions. For example, there are some very complex, application-oriented sites that we end up making exceptions for."
"The user monitoring could still be improved."
"We are now transitioning to another solution. The main reason for that is that managing all of the exceptions and troubleshooting all of the issues our users have had connecting to the internet has become too significant in terms of workload, compared to what we hope we will have with another solution."
"Currently, I don't have a good way to see which of my rules are being used in the access control lists."
 

Pricing and Cost Advice

"It is not expensive, and it is also not cheap. iboss is priced right in the sweet spot for the number of features it offers."
"We had the cost of purchasing a new appliance along with the implementation and licensing costs. However, the following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs."
"We have not priced the solution recently, but they were competitive with other vendors in the past."
"It is probably in line with other solutions, but I do not deal with the financial side."
"The overall pricing for iboss is very competitive and transparent."
"It is expensive compared to one of its competitors."
"The product is reasonably priced compared to other vendors. I rate the pricing a two or three."
"There is training involved. If you're going to add more people to it, such as cross train more of your group, there's a cost. Other than that, that's it. We have paid exactly what the invoices have said. We signed a three-year contract and not gone above it."
"We have our pricing by user. We do our pricing agreements annually. There are also additional costs for maintenance."
"When considering only the cost, the solution may appear to be costly; however, when evaluated in terms of commercial value, Bitglass is not expensive."
"The licensing cost for Forcepoint ONE would depend on the features, but the pricing is very competitive here in Brazil. The solution offers a good price, and I would rate it a three or a four in terms of pricing. I don't have information on whether there are additional costs apart from the standard licensing fees for Forcepoint ONE."
"Typically, the longer you price forward, the better off you're going to be. They have been very willing to work with us on pricing."
"The solution is expensive. It's more expensive than the solution I previously used. Compared with the other cloud-based solutions, it's very competitive."
"We save a ton of money and time. Previously, the numerous hits that we were receiving from our security tools, prior to implementing them, had to all be chased down, dispositioned, and endpoints had to be reimaged. It was just a ton of effort to do all that. That is where the savings from time and money come in."
"It is appropriately priced for what they're doing for us. Considering the protection provided, I feel their pricing is spot-on."
report
Use our free recommendation engine to learn which Secure Web Gateways (SWG) solutions are best for your needs.
893,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
11%
Manufacturing Company
9%
Computer Software Company
9%
Construction Company
7%
Financial Services Firm
14%
Computer Software Company
9%
Comms Service Provider
7%
Manufacturing Company
7%
Manufacturing Company
14%
Retailer
10%
Computer Software Company
9%
Construction Company
9%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business6
Midsize Enterprise7
Large Enterprise8
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise3
Large Enterprise12
No data available
 

Questions from the Community

What needs improvement with iboss?
The problem our organization had is that iboss failed for the Mac devices. It is not able to give a successful agent ...
What is your primary use case for iboss?
We used iBoss mainly for Internet Access by having an Agent on Windows laptops Primarily because when we try to use i...
What is your experience regarding pricing and costs for iboss?
I am not involved in pricing, but as per the information I have, during that time, the Blue Coat proxies we were usin...
What is your experience regarding pricing and costs for Forcepoint ONE?
The aspects of pricing, setup cost, and licensing are managed by our sales team, as I handle the technical side.
What needs improvement with Forcepoint ONE?
Forcepoint ONE could be improved in terms of scalability to better support hybrid environments, as many organizations...
What advice do you have for others considering Forcepoint ONE?
I advise others looking into using Forcepoint ONE to study its features, as it covers many of the use cases usually a...
What needs improvement with Menlo Security Secure Web Gateway?
There aren't specific areas for improvement; however, they're not as well known as the big vendors such as Palo Alto....
What is your primary use case for Menlo Security Secure Web Gateway?
People are mainly using it for zero trust web access. Menlo Secure is built from the ground up to provide zero basic ...
What advice do you have for others considering Menlo Security Secure Web Gateway?
Secure file sharing and data protection is not exactly what Menlo Secure is designed to do. While it can handle some ...
 

Also Known As

iBoss Cloud Platform
Bitglass
Menlo Security Web Security, Menlo Web Security
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
UNC-Charlotte
Information Not Available
Find out what your peers are saying about Forcepoint ONE vs. Menlo Secure and other solutions. Updated: April 2026.
893,311 professionals have used our research since 2012.