Cyber Security Head at Turnkey Integrated Technologies TK-IT
Reseller
Top 5
2024-08-01T13:41:43Z
Aug 1, 2024
Educational institutions are the main users. We planned to use it as an all-in-one solution, primarily as an edge solution and Internet-facing firewall.
I use the Forcepoint Next Generation Firewall in my company for the protection of the Layer-2 networking area, which consists of Wi-Fi connections used in the enterprise.
Division Manager, Information Technology at Lonestar
Real User
Top 5
2024-04-01T09:06:03Z
Apr 1, 2024
The platform is a firewall and Unified Threat Management (UTM) solution. We have implemented it in our production environment, particularly with VPN configurations. It proves to be an excellent tool for safeguarding our perimeter network. One of its standout features is its centralized management server, allowing us to manage multiple devices using a single console efficiently.
Our use cases involve deploying the Forcepoint solution, which includes installing the SMC server, management server, log server, as well as physical appliances and designing the clustering of Forcepoint.
Learn what your peers think about Forcepoint Next Generation Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Senior Network Engineer at a tech services company with 11-50 employees
Real User
Top 10
2022-05-12T22:20:00Z
May 12, 2022
Forcepoint is a next-generation firewall, we are using it as a firewall for one of our customers, which includes one data center and 95 branches. Using the SD-WAN feature on Forcepoint NGFW, we provide a secure connection from all the branches to the data center.
Security Product Manager at a tech services company with 201-500 employees
Real User
2022-03-17T12:49:02Z
Mar 17, 2022
I offer our clients the Forcepoint Next Generation Firewall. I work as a presales representative and a product manager for Forcepoint. I'm working on product demonstration demos and proofs-of-concept. I give customers sessions and show them firewall demos. Even if it's on-premises, cloud-based, or virtualized.
Many of our clients have a two-stage firewall. They use one vendor in the data center and another on-prem, so we have to choose between Forcepoint or Cisco. There are choices, but many of our clients have Forcepoint.
We primarily provide the solution to our customers. I don't create the use cases. I just deploy as required. Largely, the solution is used for protection. It can be used for various purposes, including URL filtering, spam filtering, and VPN.
We are a platinum partner of Forcepoint. We work on most of the Forcepoint portfolio, such as web security, event security, and DLP at the endpoint level as well as at the laptop level. This solution can be used for different use cases. You can deploy it as an IPS near the data center zone. You can also put it in-line, which is recommended most of the time not only for Forcepoint but also for many other next-generation firewall vendors. Otherwise, you need to deploy it as a normal next-generation firewall and enable some specific IPS policies on the firewall itself. One of our customers needed encryption between remote sites. We have a professional services team that handles the implementation of these solutions. We install the latest version of this solution. Most of the customers ask for an on-premises deployment. There are some customers who ask for a private cloud deployment.
Head of Infrastructure & Cloud Section at a computer software company with 1,001-5,000 employees
Real User
2020-09-06T08:04:33Z
Sep 6, 2020
We give consultancy and propose technology based on the customer's design. We also do long-term deployments. Normally, our solutions are deployed on-premises. We have some key projects where almost everything is deployed on-premises. We also manage the solutions and infrastructures with firewalls, network devices, etc. We have a great experience with different technologies, and Forcepoint is one of them.
We had planned on using this product as our multi-tenant firewall. After one year, we stopped using it because there was a problem with supporting some of the protocols.
Security Pre-Sales Manager at a tech services company with 51-200 employees
Real User
2019-10-27T06:19:00Z
Oct 27, 2019
Our customers use Forcepoint like a cluster, which is standby active and passive. They also use it for the perimeter firewall, so it's on-premises. The primary use case for this solution is when a customer asks for something that does automatic optimization, as well as security at the same time. It also has high performance capabilities, including enabling the SSL decryption feature. I recommend Forcepoint for these customers. If the customer has another solution for deep packet inspection of SSL encrypted traffic, I recommend Palo Alto, because they already have a solution for deep packet inspection for the kind of traffic in the network. From my point of view, at this point they do not need Forcepoint, so I would recommend Palo Alto.
Security Specialist at a energy/utilities company with 51-200 employees
Real User
2019-10-06T16:38:00Z
Oct 6, 2019
Our primary use case for this solution is as a perimeter between our internal and external networks. It is a critical security firewall. We have an on-premises deployment.
I work for a distribution company. We implement around 2,300 firewalls in Egypt for schools. We use the licenses to manage all these firewalls together and push policies for the firewall. We use it for security to restrict some rules for accessing the internet for students.
Forcepoint Next Generation Firewall is a versatile and comprehensive solution for perimeter security, offering features such as SD-WAN, IPS, VPN, and cloud or on-premises subscription keys. It is preferred by many clients over Cisco and is used for obligation redundancy, VPN access, and as the main point of security in infrastructure.
The product is praised for its simplicity, flexibility, complete feature set, scalability, and central management capabilities. Other valuable features...
Educational institutions are the main users. We planned to use it as an all-in-one solution, primarily as an edge solution and Internet-facing firewall.
I use the Forcepoint Next Generation Firewall in my company for the protection of the Layer-2 networking area, which consists of Wi-Fi connections used in the enterprise.
The platform is a firewall and Unified Threat Management (UTM) solution. We have implemented it in our production environment, particularly with VPN configurations. It proves to be an excellent tool for safeguarding our perimeter network. One of its standout features is its centralized management server, allowing us to manage multiple devices using a single console efficiently.
Our use cases involve deploying the Forcepoint solution, which includes installing the SMC server, management server, log server, as well as physical appliances and designing the clustering of Forcepoint.
We primarily use the solution for perimeter security. We use it across the entire office.
We primarily use it as a next-generation firewall.
I use Next Generation Firewall as the main point of security in our infrastructure.
Forcepoint is a next-generation firewall, we are using it as a firewall for one of our customers, which includes one data center and 95 branches. Using the SD-WAN feature on Forcepoint NGFW, we provide a secure connection from all the branches to the data center.
I offer our clients the Forcepoint Next Generation Firewall. I work as a presales representative and a product manager for Forcepoint. I'm working on product demonstration demos and proofs-of-concept. I give customers sessions and show them firewall demos. Even if it's on-premises, cloud-based, or virtualized.
We publish books and use Forcepoint Firewall as the first line of defense on VPN access.
Many of our clients have a two-stage firewall. They use one vendor in the data center and another on-prem, so we have to choose between Forcepoint or Cisco. There are choices, but many of our clients have Forcepoint.
We use it for SD-WAN, IPS, VPN, and subscription keys on the cloud or have an MDM on-premises.
Our customer uses this solution as a standard next-generation firewall and VPN.
We primarily provide the solution to our customers. I don't create the use cases. I just deploy as required. Largely, the solution is used for protection. It can be used for various purposes, including URL filtering, spam filtering, and VPN.
We use this product to improve our security, as part of our overall solution that includes antivirus, IPS, and other products.
The solution has the ability to stop the latest malware threats and any exploits to computer systems.
We use the solution in a data center for security.
We are a platinum partner of Forcepoint. We work on most of the Forcepoint portfolio, such as web security, event security, and DLP at the endpoint level as well as at the laptop level. This solution can be used for different use cases. You can deploy it as an IPS near the data center zone. You can also put it in-line, which is recommended most of the time not only for Forcepoint but also for many other next-generation firewall vendors. Otherwise, you need to deploy it as a normal next-generation firewall and enable some specific IPS policies on the firewall itself. One of our customers needed encryption between remote sites. We have a professional services team that handles the implementation of these solutions. We install the latest version of this solution. Most of the customers ask for an on-premises deployment. There are some customers who ask for a private cloud deployment.
We are using this solution as our corporate firewall.
We give consultancy and propose technology based on the customer's design. We also do long-term deployments. Normally, our solutions are deployed on-premises. We have some key projects where almost everything is deployed on-premises. We also manage the solutions and infrastructures with firewalls, network devices, etc. We have a great experience with different technologies, and Forcepoint is one of them.
I provide Forcepoint services to my clients.
We had planned on using this product as our multi-tenant firewall. After one year, we stopped using it because there was a problem with supporting some of the protocols.
We use it for a government network, here in Fiji.
Our primary uses for Forcepoint are internet access, filtering, and intruder detection. We also use it for file sharing.
Forcepoint makes up part of our security solution.
We just use this firewall for security in terms of network access.
Our customers use Forcepoint like a cluster, which is standby active and passive. They also use it for the perimeter firewall, so it's on-premises. The primary use case for this solution is when a customer asks for something that does automatic optimization, as well as security at the same time. It also has high performance capabilities, including enabling the SSL decryption feature. I recommend Forcepoint for these customers. If the customer has another solution for deep packet inspection of SSL encrypted traffic, I recommend Palo Alto, because they already have a solution for deep packet inspection for the kind of traffic in the network. From my point of view, at this point they do not need Forcepoint, so I would recommend Palo Alto.
Our primary use case for this solution is as a perimeter between our internal and external networks. It is a critical security firewall. We have an on-premises deployment.
I work for a distribution company. We implement around 2,300 firewalls in Egypt for schools. We use the licenses to manage all these firewalls together and push policies for the firewall. We use it for security to restrict some rules for accessing the internet for students.