Regional Solutions Manager at a tech services company with 11-50 employees
Real User
Top 20
2023-02-16T13:58:00Z
Feb 16, 2023
We use the solution to detect the logins from specific geolocations. We are able to detect malware when it comes to logins around our cloud services. If you have about three failed attempts, it deactivates your accounts and the administrator has to reinstate you to log in. We have specified a list of countries, which we would and wouldn’t accept logins from. Once we have the geolocation policy set up, logins from the blacklisted countries get dropped. It gives us the complete capability to have a bit of control over the actions of our users. Like, we can see what our users are doing with the cloud applications. It also gives us the capability to scan and see Shadow IT applications our users are using as transaction applications. So, it serves its purpose.
We use Forcepoint for endpoint security. We profile for endpoint security devices such as laptops, and we configure different types of user groups for it.
Regional Solutions Manager (Sub-Sahara Africa) at Infodata
Real User
2022-05-29T12:53:00Z
May 29, 2022
We are security-centered and security-conscious. It's more of a security thing for us, however, there are other environments that are more in compliance.
Forcepoint CASB (Cloud Access Security Broker) is a security solution which is designed to secure and monitor the use of cloud services within an organization. It helps organizations gain visibility and control over the cloud applications and services being used by their employees. Forcepoint CASB integrates with cloud service providers' APIs and employs various techniques such as traffic analysis, proxying, and API-based controls to provide security and visibility into cloud application...
We use the tool for web security.
We use the solution to detect the logins from specific geolocations. We are able to detect malware when it comes to logins around our cloud services. If you have about three failed attempts, it deactivates your accounts and the administrator has to reinstate you to log in. We have specified a list of countries, which we would and wouldn’t accept logins from. Once we have the geolocation policy set up, logins from the blacklisted countries get dropped. It gives us the complete capability to have a bit of control over the actions of our users. Like, we can see what our users are doing with the cloud applications. It also gives us the capability to scan and see Shadow IT applications our users are using as transaction applications. So, it serves its purpose.
We use Forcepoint for endpoint security. We profile for endpoint security devices such as laptops, and we configure different types of user groups for it.
We are security-centered and security-conscious. It's more of a security thing for us, however, there are other environments that are more in compliance.
We primarily use the solution to protect data going out of cloud applications.
We provide solutions to our consumers.