What is our primary use case?
We are a professional services company and I use this solution in my office, but I also implement it for some of my customers. This product is used as a security gateway, and more generally, as part of an internet security solution.
I have some customers who have deployed this solution on-premises, while others have a hybrid cloud deployment using Azure or AWS.
How has it helped my organization?
I can now go to sleep not being bothered of users accessing sites that are wasteful or can compromise security.
What is most valuable?
The most valuable feature is the categorization, where you can allow general access to an application but limit specific features. For example, you can allow a user to access Facebook, yet restrict their ability to stream Facebook videos or download pictures. The same thing can be done on services like YouTube. A similar example is that of online storage solutions, where you can approve storage collaboration with Office 365 SharePoint, but limit them from using OneDrive or Box.
I really like the fact that you aren't required to get a Forcepoint appliance. It can be deployed on a VM and I am happy to have my own servers.
Forcepoint integrates well with other appliances.
What needs improvement?
The deployment is a bit complex and it requires expertise to deploy, which is something that should be improved and made easier to do.
For how long have I used the solution?
I have been working with Forcepoint Web Security for approximately three years.
What do I think about the stability of the solution?
We have not had any problems with the stability of Forcepoint.
How are customer service and support?
I have been in contact with technical support and they are great. Every time I call for assistance, they always help. Whether it is weekdays or weekends, if I need a technical session or I request materials or ask them to guide me through something, they've always been very helpful. If you have a pending case then they call you to give you updates and see what else can be done to resolve the problem. They don't allow you to just hunt down issues on your own. Rather, they will help and you are assured that they will work with you.
This is the kind of assurance that we give to our customers or anybody else who is looking into implementing Forcepoint. Especially in my region, I am very confident with the helpfulness and capability of the support, no matter who the customer is.
Which solution did I use previously and why did I switch?
I am a reseller for many different types of security solutions, and I have a preference in favor of Forcepoint. There are downsides to other solutions that I have not encountered with Forcepoint, and moreover, the support in my region is massive.
How was the initial setup?
The deployment is a bit complex. If you have all of the prerequisites and know all of the sites then the deployment can be done in a few days or a week. It's very rare not to encounter issues because customers will make requests, and you get stuck because of the different environments. You have to contact the customer to figure out how to resolve problems, and it can be time-consuming. The important thing is to have the planning done before starting the implementation.
The simple part of the deployment is the installation on the VM. You just have to get the license, visit the support portal, download the image, and install it on the virtual machine. When deploying on the cloud, you just have to make sure that you have space in Azure.
What about the implementation team?
We have an in-house team to handle deployment.
What's my experience with pricing, setup cost, and licensing?
The Prices are fair and you are assured of getting the value for your money.
What other advice do I have?
Forcepoint looks ahead at what is needed and they seem to be on track. Two years ago, they knew what they would be doing in 2020, and they are on the right path.
I would rate this solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
To me SSL inspection is actually an obvious "Man In The Middle Attack" disclosing the privacy of users even if it's quite mandatory from the security perspective. I believe that doing the SSL inspection inside an appliance is a compromise. But don't you think that sending decrypted data out of the box excesses admissible limits?