The primary use case of the product is to ensure security and protection in a SASE (Secure Access Service Edge) environment. It serves multiple purposes, including securing roaming users and protecting users accessing resources outside the office. Another key aspect is safeguarding Insight applications using ZTE (Zero Trust Exchange) and preventing data leakage. In daily operations, it is primarily utilized through ZPA (Zero Trust Network Access), ensuring users have secure access to the internet. It involves protecting corporate devices from advanced threats and malicious sites and enforcing data isolation policies to prevent unauthorized data access or leakage. Additionally, the solution facilitates the secure transfer of sensitive data through various applications like Dropbox, utilizing policies set within the SSE (Secure Web Gateway) solution, potentially incorporating a model such as CASB (Cloud Access Security Broker).
System Engineer at NetScout Systems
Provides centralized system monitoring and has a valuable feature for data protection
Pros and Cons
- "The most valuable features of Forcepoint include Zero Trust Network Access and remote user protection for private applications."
- "Areas for improvement for the platform include addressing scalability and architecture concerns, especially for large deployments involving more than 500 or 1,000 users."
What is our primary use case?
What is most valuable?
The most valuable features of Forcepoint include Zero Trust Network Access and remote user protection for private applications. These features prioritize data security regardless of the user's location, ensuring that data is always protected. In terms of threat defense, the thread detection feature stands out as particularly valuable. It includes various capabilities such as web isolation to isolate unknown static, blocking access to malicious sites, and employing intelligence-driven checks based on configured policies. Integrating third-party sandboxing further enhances threat detection and response capabilities, providing comprehensive protection against advanced threats. It collectively contributes to a robust defense mechanism, safeguarding organizations against various security threats.
What needs improvement?
Areas for improvement for the platform include addressing scalability and architecture concerns, especially for large deployments involving more than 500 or 1,000 users.
Additionally, integrating sandboxing features directly into the solution, either on-premise or in the cloud, is crucial for comprehensive threat detection and response. It would eliminate the need to rely on third-party sandboxing solutions, streamlining security operations and enhancing overall efficiency and effectiveness in combating threats.
For how long have I used the solution?
We have been using Forcepoint ONE for 14 months.
Buyer's Guide
Forcepoint ONE
March 2025

Learn what your peers think about Forcepoint ONE. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
845,040 professionals have used our research since 2012.
What do I think about the stability of the solution?
Regarding stability, I have confidence in Forcepoint's technology and its ability to perform well in the market. However, being hosted on AWS has its architectural challenges, as is typical with any cloud-based solution. While it has the potential to overcome these challenges and further enhance its capabilities, it's important to acknowledge the inherent complexities that can arise in a public cloud environment.
What do I think about the scalability of the solution?
We have around 5,000 Forcepoint ONE users. Scalability is one of the product's notable strengths. Its architecture facilitates rapid scalability, particularly its polytexture architecture deployed on AWS. Spinning a virtual machine (VM) in any location is almost instantaneous. It gives it an edge over solutions like Zscaler, which may require setting up entire private data centers for expansion. While Forcepoint's scalability advantage is evident, it still faces challenges inherent to its architecture.
By consolidating multiple security functions into a single client, particularly incorporating Data Loss Prevention (DLP) and Secure Web Gateway (SWG) functionalities, Forcepoint has streamlined our security infrastructure.
How are customer service and support?
Resolving issues has sometimes taken longer than expected. While the initial response time has been problematic, support effectiveness improves upon escalation.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We previously used a different solution before transitioning to Forcepoint. The decision to switch was driven by various factors, including the need for improved sandboxing capabilities, especially regarding onboarding. Additionally, Forcepoint's deployment in a public cloud environment posed challenges for organizations needing to utilize AWS, such as those favoring the Google Cloud Platform. This discrepancy in cloud provider compatibility influenced the decision to transition to a solution that aligns better with our organization's cloud infrastructure preferences and requirements.
How was the initial setup?
The initial setup was straightforward, primarily because everything was managed from the Forcepoint side, requiring no additional maintenance efforts. Deployment was relatively simple, especially when the organization clearly understood its objectives and requirements. The process took little time as long as the objectives were well-defined. However, if the organization needs to be clearer about its needs, it could prolong the setup process. In general, the technology was simple, and anyone could become proficient in managing it properly. Therefore, while the setup could vary depending on the clarity of objectives, the technology itself was relatively easy to implement.
What other advice do I have?
Integrating services within Forcepoint has significantly enhanced our organization's security posture by enabling seamless authentication, centralized monitoring, comprehensive data correlation, and compatibility with third-party technologies. It ensures streamlined access management, proactive threat detection, informed decision-making, and cohesive security operations, ultimately fortifying our defenses against advanced threats and maintaining a proactive security stance.
Its data protection capabilities have greatly benefited our organization by providing comprehensive protection for our intellectual property and sensitive data. With Forcepoint, users accessing corporate applications and the internet are shielded from accessing malicious sites or falling victim to threats. It ensures that our data remains secure, whether in motion, use, or rest. It safeguards against data leakage, whether intentional or unintentional, by monitoring and controlling data transfer through various channels such as private apps, public SaaS applications, or third-party emails.
Forcepoint ONE shows significant potential for improvement while still being a commendable product. I would give it around an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner

IT Manager at a financial services firm with 1,001-5,000 employees
Provides valuable data protection features, but there could be essential information available for understanding the functionality
Pros and Cons
- "The platform's feature that has been most beneficial for our web security is its capability to replicate rules."
- "We encounter challenges in determining whether certain features for blocking certain file types or preventing automatic downloads are functioning correctly."
What is our primary use case?
Forcepoint ONE's primary use case involves safeguarding the browsing activities of users who bring their laptops home. Specifically, we aim to protect their internet navigation while in their residences. Additionally, we need to secure specific applications to ensure that sensitive data and resources remain protected.
What needs improvement?
While we have some product information available, there are instances where we need a comprehensive understanding of all the features. We encounter challenges in determining whether certain features for blocking certain file types or preventing automatic downloads are functioning correctly. These particular areas need improvement.
What do I think about the stability of the solution?
We require high availability of 99.9%, and we believe the platform can effectively meet this requirement.
What do I think about the scalability of the solution?
I rate the scalability of Forcepoint ONE as around seven. It was easy to scale, but as we expand our user base and deployment, we anticipate the need for further exploration and optimization. We expect it to be scalable, but we have yet to deploy the solution fully.
How was the initial setup?
The initial setup was easy to deploy. However, configuring certain features presented challenges.
What other advice do I have?
The platform's feature that has been most beneficial for our web security is its capability to replicate rules. This functionality allows us to maintain consistent navigation policies for users, even when they transition between working from home and in the office. By replicating rules, we can effectively extend our border access control.
With the data protection features, we have noticed a considerable improvement in our control over security incidents. Specifically, we have enhanced control over blocking malicious applications and preventing access to websites with a poor reputation.
I recommend Forcepoint ONE to others. It's a simple and highly useful solution, albeit with room for improvement in certain features, such as application blocking. For instance, blocking applications like Skype, Teams, WhatsApp, or similar could be enhanced.
I rate it a seven out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Forcepoint ONE
March 2025

Learn what your peers think about Forcepoint ONE. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
845,040 professionals have used our research since 2012.
Consultant at SATELITE.COM
Easy to deploy product with efficient monitoring features
Pros and Cons
- "The setup is relatively straightforward."
- "The solution's integration with other products needs improvement."
How has it helped my organization?
The product is important for protecting the environment and information.
What is most valuable?
The platform's cloud-based console is quite valuable. Additionally, its integration with DLP is effective.
What needs improvement?
The solution's integration with other products needs improvement.
For how long have I used the solution?
We have been using Forcepoint ONE for two years.
What do I think about the stability of the solution?
I rate the product stability an eight.
What do I think about the scalability of the solution?
Our clients are typically enterprise businesses with around 1000 Forcepoint ONE users.
How are customer service and support?
We have encountered numerous issues with support over the past two years, particularly with response times.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We used other solutions before.
How was the initial setup?
The setup is relatively straightforward. We encountered challenges while integrating it with WhatsApp. I rate the process an eight.
What's my experience with pricing, setup cost, and licensing?
The product is reasonably priced compared to other vendors. I rate the pricing a two or three.
What other advice do I have?
The platform has a great capacity for protecting and managing data.
I recommend it because deploying, monitoring, and configuring policies is easy.I rate an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: reseller
Last updated: Aug 10, 2024
Flag as inappropriateRegional Solutions Manager Sub Saharan Africa at Infodata Professional Services Limited
Easy to deploy, stable, and scalable
Pros and Cons
- "By default without a policy, Bitglass has the capability to notify the admin of multiple or simultaneous logins across a wide range of geographical regions."
- "Bitglass integration with some IDP providers needs improvement."
What is our primary use case?
We use Bitglass for real-time scanning and its unique VM that enables reverse proxy capabilities. Bitglass can also act as an IDP for us when we don't have an identity provider.
How has it helped my organization?
The solution enforces our devices no matter where it is located even across our cloud devices reducing the manual work we have to do.
What is most valuable?
By default without a policy, Bitglass has the capability to notify the admin of multiple or simultaneous logins across a wide range of geographical regions. The solution will take action if the same credentials are used in multiple regions at the same time, preventing unauthorized access.
What needs improvement?
Bitglass integration with some IDP providers needs improvement. Currently, the solution is not compatible with Azure AD for third-party authentication. The fraud proxy in the SmartEdge agent is not compatible with Forcepoint DLP or a web hybrid agent. I would like the developers to consolidate multiple agents across systems for better integration.
For how long have I used the solution?
I have been using the solution for seven months.
What do I think about the stability of the solution?
The solution is stable. I have not seen any performance or availability issues with the solution.
What do I think about the scalability of the solution?
The solution is extremely scalable. The solution can increase as our resources increase. One of our customers has 15,000 users.
How was the initial setup?
The initial setup is straightforward. The solution is a soft application so the portal that is generated gives us access and the vendor does everything required. We get our login as a master administrator and from there we can onboard more addresses. The last step is to integrate with the cloud application.
What was our ROI?
Bitglass provides a good return on investment eventually.
What's my experience with pricing, setup cost, and licensing?
When considering only the cost, the solution may appear to be costly; however, when evaluated in terms of commercial value, Bitglass is not expensive.
What other advice do I have?
I give the solution a nine out of ten.
Bitglass is a good solution that can be consolidated with other solutions from the same vendor.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: partner
Senior Executive Account Manager at Grupo Binario
Has valuable monitoring, DLP, and SIEM communication features
Pros and Cons
- "Forcepoint ONE is okay for me, and I find it a very good solution. Its most valuable feature is monitoring. Its monitoring is very good, and it can communicate with a SIEM system. I also find the DLP feature of Forcepoint ONE good."
- "One area for improvement in Forcepoint ONE is that you'll need more training to install the solution yourself. I practiced in a laboratory and I needed more technical information to do the installation."
How has it helped my organization?
Forcepoint ONE is a very, very good product, especially for my SOC (security operations center) team though you'll need to get a lot of training to optimize the solution and ensure that it meets your needs. Forcepoint ONE is a very good monitoring solution, and it gives my organization a lot of information on how to boost security and how to keep new products or new applications secure.
What is most valuable?
Forcepoint ONE is okay for me, and I find it a very good solution. Its most valuable feature is monitoring. Its monitoring is very good, and it can communicate with a SIEM system. I also find the DLP feature of Forcepoint ONE good.
What needs improvement?
One area for improvement in Forcepoint ONE is that you'll need more training to install the solution yourself. I practiced in a laboratory and I needed more technical information to do the installation.
What do I think about the stability of the solution?
In the laboratory, Forcepoint ONE is stable, but I don't know if it's stable in a real environment because I have not installed it yet in the real world. In a laboratory setting, it is pretty stable.
What do I think about the scalability of the solution?
Forcepoint ONE is a very scalable solution.
How are customer service and support?
The technical support for Forcepoint ONE is very good, at least when I needed support in a laboratory setting. On a scale of one to five, with five being the best, I'm rating the support a four.
How was the initial setup?
In terms of the initial setup for Forcepoint ONE, I'm rating it a three out of five. I'm giving it a score of 60 percent out of one hundred percent. I currently don't have an implementation strategy, but if I need to implement the solution, I would need more training, or even take a special course on how to implement Forcepoint ONE.
What about the implementation team?
Forcepoint ONE was deployed through an integrator or consultant.
What was our ROI?
I don't have information on the ROI from Forcepoint ONE.
What's my experience with pricing, setup cost, and licensing?
The licensing cost for Forcepoint ONE would depend on the features, but the pricing is very competitive here in Brazil. The solution offers a good price, and I would rate it a three or a four in terms of pricing. I don't have information on whether there are additional costs apart from the standard licensing fees for Forcepoint ONE.
Which other solutions did I evaluate?
My company didn't evaluate other options because it is an integrator of Forcepoint ONE, so it only has Forcepoint ONE as its solution. This means I didn't do any testing with competitors such as Zscaler and Netskope.
What other advice do I have?
My company is a partner and reseller of Forcepoint ONE. I work with the solution, though I'm not as experienced with it. I had my training in the Forcepoint laboratory in Brazil because I just started working with the solution, but I know how Forcepoint ONE works, how to use it, and how to implement it. I'm using the latest version of the solution.
The number of staff required to deploy and maintain Forcepoint ONE depends on the number of users because the solution can also be used individually or by a single user.
My advice for people looking into implementing Forcepoint ONE is to take a course or go into training because the solution may seem easy, but it's not, particularly during implementation, because it would still depend on your tool. You need to understand your tool well and how you can adapt it to Forcepoint ONE. The solution is not easy if it doesn't have a direct integration with your tool. When you go direct to the cloud, there's no problem, but when you need it to be a hybrid solution, it could be a bit difficult in terms of integrating it well. The integration, though it's not very, very difficult, still requires attention and care for it to be successful.
My rating for Forcepoint ONE is eight out of ten. For me to rate it a ten out of ten, the support, price, and functionality should first be improved. There would be a need to speak with the Forcepoint team about it, and the team is very, very dedicated in terms of explaining and helping you understand the solution.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Shared Information Security Officer at a university with 1,001-5,000 employees
It provides a window into who is sharing what types of data internally and externally.
What is most valuable?
- Location proximity mapping
- Data type inventory
- Simple integration
How has it helped my organization?
It allows a window into who is sharing what types of data internally and externally. It allows us know where sensitive data is really stored and offers the ability to quarantine based on data types and sharing criteria.
What needs improvement?
- Reporting
- Simpler policy creation
For how long have I used the solution?
I have used it for 16 months.
What do I think about the scalability of the solution?
The cloud-based portal tends to get slow as the number of events increase.
How are customer service and technical support?
The sales staff promised more than they can deliver, but the technical staff is excellent.
Which solution did I use previously and why did I switch?
I did not previously use a different solution.
How was the initial setup?
Initial setup was simple.
What's my experience with pricing, setup cost, and licensing?
Negotiate for the pricing model that fits your budget. The vendor is willing to customize pricing.
Which other solutions did I evaluate?
Before choosing this product, we also evaluated CloudLock, CipherCloud and Skyhigh Networks.
What other advice do I have?
Take your time and have each vendor set up an actual proof of concept, rather than just relying on a demo. Get your network and support staff engaged in the process early on because they will be instrumental in deployment and support. Know what you’re trying to accomplish.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Forcepoint ONE Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2025
Product Categories
Secure Web Gateways (SWG) Cloud Access Security Brokers (CASB) Secure Access Service Edge (SASE)Popular Comparisons
Cisco Umbrella
Prisma Access by Palo Alto Networks
Zscaler Internet Access
Lookout
Cloudflare One
Check Point Harmony SASE (formerly Perimeter 81)
Skyhigh Security
Fortinet FortiGate SWG
F5 BIG-IP Access Policy Manager (APM)
Forcepoint Secure Web Gateway
Fortinet FortiProxy
Axis Security
Menlo Secure
Buyer's Guide
Download our free Forcepoint ONE Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Evaluating CASBs. Looking for community feedback on some vendors.
- When evaluating Web Security Gateways, what aspect do you think is the most important to look for?
- What is the best security web gateway?
- Is Netskope's SWG as good as the Zscaler SWG?
- What secure web gateway do you recommend?
- Why is Secure Web Gateways (SWG) important for companies?