Try our new research platform with insights from 80,000+ expert users

Forcepoint ONE vs Menlo Secure comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

iboss
Sponsored
Ranking in Secure Web Gateways (SWG)
23rd
Average Rating
8.4
Number of Reviews
8
Ranking in other categories
Internet Security (8th), Web Content Filtering (5th), Cloud Access Security Brokers (CASB) (11th), ZTNA as a Service (15th), Secure Access Service Edge (SASE) (15th)
Forcepoint ONE
Ranking in Secure Web Gateways (SWG)
26th
Average Rating
8.4
Number of Reviews
12
Ranking in other categories
Cloud Access Security Brokers (CASB) (10th), Secure Access Service Edge (SASE) (18th)
Menlo Secure
Ranking in Secure Web Gateways (SWG)
22nd
Average Rating
9.2
Number of Reviews
4
Ranking in other categories
Firewalls (32nd), ZTNA (11th), Cloud Security Remediation (4th)
 

Featured Reviews

GZ
Sep 25, 2021
Stable and quick to set up but needs more clear status information for end users
The solution is a corporate proxy server, an intelligence proxy From a corporate perspective, I understand that it's important to keep the company data safe. From a corporate point of view, it's a good solution. The solution is stable. The solution can scale.  It was a very easy product to…
Edwin Eze-Osiago - PeerSpot reviewer
Feb 24, 2023
Easy to deploy, stable, and scalable
We use Bitglass for real-time scanning and its unique VM that enables reverse proxy capabilities. Bitglass can also act as an IDP for us when we don't have an identity provider The solution enforces our devices no matter where it is located even across our cloud devices reducing the manual work…
SH
Sep 4, 2022
A cost-effective, browser-agnostic solution that opens the session in an isolated format so that the code doesn't run locally
Right now, the only piece would be one or two reports that I'd love to get my hands on. I don't think they exist. With any system firewall or solution like this, you have to create bypasses, which is an access control list. One of the standard things that we would do in other firewalls is a regular review. We quarterly go and take a look at who we grant access to and if it is still needed. For example, when you're working with a partner, you might do a full bypass to that site as long as they are a partner, but over time, you add 200 extra rules. At some point, that partner you had ends up no longer being a partner, but that old rule is still there. You want to be safe. You need to give them access today, but you don't necessarily need to do that tomorrow. So, you need to be safe about it and block it again. Currently, I don't have a good way to see which of my rules are being used in the access control lists. I have numerous entries, but are they all still needed? A report that would show me my list of who is allowed and whether we're actually using it would be useful because I can then go clean up my list. It would be easier to manage. We would eliminate the vulnerability of unused services.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Because of iboss, I did not have to assign web filtering tasks to my techs on a daily basis."
"It was a very easy product to install. It can be deployed very fast."
"Valuable features: Within the filter: Controls (Web categories, applications, and Allow/Block list) and Network (local Subnets). Within the reporter: Logs (Event Log) and Reports."
"The security aspect of the solution, particularly the malware behind it, is excellent. That's something that really helped us out. It's not just a simple proxy that just blocks the insights of potential threats that come on behind it. They do malware detection and that helps us a lot."
"Content filtering is the most useful feature of iboss."
"Its initial setup was straightforward."
"Our primary use case for this product is DLP,"
"Technical support is pretty sharp and very responsive."
"The platform's feature that has been most beneficial for our web security is its capability to replicate rules."
"The core CASB solution is the most valuable part. It allows us to put policies in place around which devices can log into our cloud applications. We have a policy that states that only company devices can access these cloud applications."
"The solution’s AJAX-VM provides constant reverse proxy uptime. It has been very positive for our security operations. When people are trying to access the SaaS solution, it protects us from downloading any of that data and experiencing any type of attacks"
"Forcepoint ONE is okay for me, and I find it a very good solution. Its most valuable feature is monitoring. Its monitoring is very good, and it can communicate with a SIEM system. I also find the DLP feature of Forcepoint ONE good."
"The biggest thing that I like about this product is that it's easy to use and teach. When we have somebody new starting to work with the product, it's easy to teach them. It's also easy to use the product as it does so much."
"The initial setup was straightforward, which was a huge win. That mostly goes to the fact that they are agentless. We didn't have to sit there deploying thousands of agents and all the things that go along with that type of deployment. We were up and running very quickly."
"The most valuable features of Forcepoint include Zero Trust Network Access and remote user protection for private applications."
"The solution is very good when it comes to securing us against data leakage, because of the other proxy. It also has API scanning or data at rest. It inspects data in motion, which is the proxy, and then it has the data at rest, which is the API scanning. We can inspect for anything we want: file fingerprinting, PHI-sensitive data, PCI-sensitive data. It does not matter. We can usually find it and block it in transit and do our remediation with it. It could either be block, encrypt, or allow and watermark the file to follow it and see where it goes. It allows for those different scenarios."
"The fact that it is a cloud proxy solution is another feature we like. For example, if you acquire a new company, you can use it to protect that new company without the need to install anything physically on their networks."
"For us, the primary goal is protection on the web, and that's extremely important. We're not using any of the other services at this time. The web part is key to the success of the organization. It gives us the ability to protect. It can isolate. It opens the session in an isolated format so that the code isn't running locally. It is running over in the Menlo environment, not in ours. It is not running on the local computer, whereas if you were to go to a normal website, it would run Java or something else on the local machine and potentially execute the malicious code locally. So, it does give us that level of protection."
"Accessing the internet with a proxy from anywhere is the most valuable feature. It ensures that users are only able to browse legitimate websites. If they happen to go to a legitimate website with a malicious payload, the isolation feature will take care of that."
"It has reduced security events to follow up on. While it is not 100%, there has been probably a 90% or more reduction. We were getting hit left, right, and center constantly from people browsing the Internet and hitting bad websites. It was not just bad websites that were stood up to be malicious, but good sites that were compromised."
 

Cons

"Iboss is growing so fast that it is often hard for them to keep up with the challenges."
"To scale up, a new iboss Node Blade Chassis must be purchased."
"File integrity monitoring would be very advantageous as an additional feature."
"Sometimes, obviously, there are bugs."
"Sometimes the agent stops working in iboss, and we have to reinstall the agent."
"The solution could be stronger on the integration side and offer more cloud applications like G Suite or Oracle."
"SSL decryption: We had issues with learners using apps instead of using web browsers. This type of encryption is tough for any appliance in a BYOD environment."
"Its pricing could be better."
"We encounter challenges in determining whether certain features for blocking certain file types or preventing automatic downloads are functioning correctly."
"One area for improvement in Forcepoint ONE is that you'll need more training to install the solution yourself. I practiced in a laboratory and I needed more technical information to do the installation."
"Bitglass integration with some IDP providers needs improvement."
"Integration into different multi-factor authentication tools. On their page, they tout Duo, but I don't use Duo. I use another vendor. Not that they don't interact, but it takes a little bit more doing. Any amount of efficiencies here would help."
"Their new SASE (secure access service edge) product would have been the one thing I would have requested. Now that they have that platform, I'd like to see it as integrated and seamless as possible with the core product. That's what they're working towards and that's where we're seeing the advancements."
"In our environment, when an Active Directory password changes, we tend to have some latency issues with access. It takes about 15 minutes before that password is accessible through Bitglass after the change. That would be the major thing I see as a negative."
"The solution's integration with other products needs improvement."
"Areas for improvement for the platform include addressing scalability and architecture concerns, especially for large deployments involving more than 500 or 1,000 users."
"In the best of all worlds, we wouldn't have to make any exceptions. However, that is a big ask because a lot of that depends on how websites are constructed. For example, there are some very complex, application-oriented sites that we end up making exceptions for. It is really not that big an issue for us to make the exceptions. We feel like we are doing that without a huge impact on our security posture, but we do have to make some exceptions for complex sites, e.g., mostly SaaS-type sites and applications."
"Currently, I don't have a good way to see which of my rules are being used in the access control lists. I have numerous entries, but are they all still needed? A report that would show me my list of who is allowed and whether we're actually using it would be useful because I can then go clean up my list. It would be easier to manage. We would eliminate the vulnerability of unused services."
"We are now transitioning to another solution. The main reason for that is that managing all of the exceptions and troubleshooting all of the issues our users have had connecting to the internet has become too significant in terms of workload, compared to what we hope we will have with another solution."
"The user monitoring could still be improved."
 

Pricing and Cost Advice

"It is expensive compared to one of its competitors."
"We have our pricing by user. We do our pricing agreements annually. There are also additional costs for maintenance."
"Typically, the longer you price forward, the better off you're going to be. They have been very willing to work with us on pricing."
"When considering only the cost, the solution may appear to be costly; however, when evaluated in terms of commercial value, Bitglass is not expensive."
"The product is reasonably priced compared to other vendors. I rate the pricing a two or three."
"The licensing cost for Forcepoint ONE would depend on the features, but the pricing is very competitive here in Brazil. The solution offers a good price, and I would rate it a three or a four in terms of pricing. I don't have information on whether there are additional costs apart from the standard licensing fees for Forcepoint ONE."
"There is training involved. If you're going to add more people to it, such as cross train more of your group, there's a cost. Other than that, that's it. We have paid exactly what the invoices have said. We signed a three-year contract and not gone above it."
"It is appropriately priced for what they're doing for us. Considering the protection provided, I feel their pricing is spot-on."
"We save a ton of money and time. Previously, the numerous hits that we were receiving from our security tools, prior to implementing them, had to all be chased down, dispositioned, and endpoints had to be reimaged. It was just a ton of effort to do all that. That is where the savings from time and money come in."
"The solution is expensive. It's more expensive than the solution I previously used. Compared with the other cloud-based solutions, it's very competitive."
report
Use our free recommendation engine to learn which Secure Web Gateways (SWG) solutions are best for your needs.
801,394 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Financial Services Firm
12%
Manufacturing Company
9%
Educational Organization
7%
Computer Software Company
15%
Financial Services Firm
13%
Government
10%
Manufacturing Company
7%
Computer Software Company
16%
Financial Services Firm
14%
University
10%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about iboss?
Content filtering is the most useful feature of iboss.
What needs improvement with iboss?
Sometimes the agent stops working in iboss, and we have to reinstall the agent. This is a hiccup that iboss should im...
What is your primary use case for iboss?
We use iboss for the proxy solution. I used iboss in my organization to block a few sites for a few of my employees.
What do you like most about Forcepoint ONE?
The platform's feature that has been most beneficial for our web security is its capability to replicate rules.
What is your experience regarding pricing and costs for Forcepoint ONE?
The product is reasonably priced compared to other vendors. I rate the pricing a two or three.
What needs improvement with Forcepoint ONE?
The solution's integration with other products needs improvement.
What do you like most about Menlo Security Secure Web Gateway?
Accessing the internet with a proxy from anywhere is the most valuable feature. It ensures that users are only able t...
What needs improvement with Menlo Security Secure Web Gateway?
The user monitoring could still be improved. We are a government agency, so we purchased Menlo by user. If we have 3,...
What is your primary use case for Menlo Security Secure Web Gateway?
We previously used an on-premise proxy or a secure web gateway, but our employees were forced to do hybrid work durin...
 

Also Known As

iBoss Cloud Platform
Bitglass
Menlo Security Web Security, Menlo Web Security
 

Overview

 

Sample Customers

More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies.
UNC-Charlotte
Information Not Available
Find out what your peers are saying about Forcepoint ONE vs. Menlo Secure and other solutions. Updated: September 2024.
801,394 professionals have used our research since 2012.