• Categories

    • Loading categories...

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
forcepoint
4.5
1639 Reviews (All time)
Review weighting


Browse Forcepoint Reviews

Forcepoint is present in 10 markets with 13 products. Forcepoint has 1639 reviews with an overall average rating of 4.5.

Data Loss Prevention

Gartner defines data loss prevention (DLP) as a technical control designed to prevent data loss in order to comply with personal data regulations, prevent unintended disclosure, minimize insider risk and ensure that sensitive data is not overly accessible. DLP controls are typically applied to reduce the data risk for two states of unstructured data: data at rest and data in motion. Depending on the state of the data, DLP applies detective, preventive or corrective controls, including alerting, quarantining, blocking, redaction or access restriction.

Forcepoint has 1 product in Data Loss Prevention market
  • Forcepoint DLP
    4.4
    544 Reviews

Data Security Posture Management

Data security posture management (DSPM) discovers previously unknown data across on-premises data centers and cloud service providers (CSPs). It also helps categorize and classify previously unknown and discovered unstructured and structured data. As data rapidly proliferates, DSPM assesses who has access to it to determine its security posture and exposure to privacy, security and AI-usage-related risks. DSPM is delivered as software or as a service.

Forcepoint has 1 product in Data Security Posture Management market
  • Forcepoint DSPM
    4.4
    8 Reviews

Email Security Platforms (Transitioning to Email Security)

Gartner defines an email security platform as a product that secures email infrastructure. Its primary purpose is the removal of malicious (phishing, social engineering, viruses) or unsolicited messages (spam, marketing). Other functions include email data protection, domain-based message authentication, reporting and conformance (DMARC), investigation, and remediation through a dedicated console. These solutions may integrate as a secure email gateway (SEG) for predelivery protection or as an integrated cloud email security (ICES) solution for postdelivery protection. Email security platforms protect an organization’s email infrastructure from social engineering, phishing, business email compromise, spam, malware attacks and data theft. These platforms are deployed independently but integrated with other network and endpoint security controls to improve the overall risk posture of the organization. They offer cybersecurity teams visibility into email-related security incidents for investigation and remediation.

Forcepoint has 1 product in Email Security Platforms (Transitioning to Email Security) market
  • Forcepoint Email Security
    4.6
    92 Reviews

IT Security

IT Security refers to products and services that protect digital systems and data from cyber threats and unauthorized access. This category includes markets that focus on network security, identity management, data protection, and cloud security, enabling organizations to reduce risk, ensure compliance, and operate securely in a digital world.

Forcepoint has 1 product in IT Security market
  • Forcepoint Web Security (Appliance)
    4.4
    223 Reviews

Network Firewalls (Transitioning to Hybrid Mesh Firewall and Cloud Firewalls)

Gartner defines the network firewall market as the market for firewalls that use bidirectional stateful traffic inspection (for both egress and ingress) to secure networks. Network firewalls are enforced through hardware, virtual appliances and cloud-native controls. Network firewalls are used to secure networks. These can be on-premises, hybrid (on-premises and cloud), public cloud or private cloud networks. Network firewall products support different deployment use cases, such as for perimeters, midsize enterprises, data centers, clouds, cloud-native and distributed offices.

Forcepoint has 2 products in Network Firewalls (Transitioning to Hybrid Mesh Firewall and Cloud Firewalls) market
  • Forcepoint Next-Gen Firewall
    4.5
    159 Reviews
  • Forcepoint Sidewinder(Legacy)
    4.5
    5 Reviews

Network Sandboxing (Transitioning to Hybrid Mesh Firewalls & Security Service Edge)

Network-based sandboxing is a proven technique for detecting malware and targeted attacks. Network sandboxes monitor network traffic for suspicious objects and automatically submit them to the sandbox environment, where they are analyzed and assigned malware probability scores and severity ratings. Sandboxing technology has been used for years by malware researchers at security companies and even in some large enterprises that are highly security conscious. Traditionally, using a sandbox has been an intensive effort requiring advanced skills. The malware researcher manually submits a suspicious object into the sandbox and analyzes it before flagging it as malware or not. By adding automated features to sandboxing technology (automatically submitting suspicious objects and automatically generating alerts).

Forcepoint has 1 product in Network Sandboxing (Transitioning to Hybrid Mesh Firewalls & Security Service Edge) market
  • Forcepoint Advanced Malware Detection
    4.7
    14 Reviews

SASE Platforms

Secure access service edge (SASE) platforms deliver converged network and security-as-a-service capabilities, such as software-defined WAN (SD-WAN) and secure access to the web, cloud services and private applications regardless of the user’s location, the device used or where that application is hosted. These offerings primarily use a cloud-centric architecture delivered as a platform by one vendor. SASE securely connects users and devices with applications, services and other users. It supports branch office and remote worker connectivity and on-premises general internet security, private application access and public cloud service provider access use cases.

Forcepoint has 1 product in SASE Platforms market
  • Forcepoint ONE with FlexEdgeSD-WAN
    4.9
    38 Reviews

SD-WAN

Gartner defines software-defined WAN (SD-WAN) as products used to connect branch locations to other enterprise and cloud locations. SD-WAN products provide dynamic path selection based on business or application policy, routing, centralized orchestration of policy and management of appliances, virtual private network (VPN) and zero-touch configuration. SD-WAN products are WAN transport/carrier-agnostic and create secure paths across physical WAN connections.

Forcepoint has 2 products in SD-WAN market
  • Forcepoint Next Generation Firewall
    4.7
    92 Reviews
  • Forcepoint FlexEdge Secure SD-WAN
    4.8
    49 Reviews

Security Service Edge

Gartner defines security service edge (SSE) as an offering that secures access to the web, cloud services and private applications regardless of the location of the user, the device they are using or where that application is hosted. SSE protects users from malicious and inappropriate content on the web and provides enhanced security and visibility for the SaaS and private applications accessed by end users. Security service edge provides a primarily cloud-delivered solution to control access from end users and devices to applications, as well as websites and the internet. It provides a range of security capabilities, including adaptive access based on identity and context, malware protection, data security and threat prevention, as well as the associated analytics and visibility. It enables more direct connectivity for hybrid users by reducing latency and providing the potential for improved user experience. Capabilities that are integrated across multiple traffic types and destinations allow a more seamless experience for both users and administrators while maintaining a consistent security stance.

Forcepoint has 2 products in Security Service Edge market
  • Forcepoint Private Access (Legacy)
    4.0
    3 Reviews
  • Forcepoint ONE
    4.6
    387 Reviews

Zero Trust Network Access (Transitioning to Security Service Edge)

Gartner defines zero trust network access (ZTNA) as products and services that create an identity and context-based, logical-access boundary that encompasses an enterprise user and an internally hosted application or set of applications. The applications are hidden from discovery, and access is restricted via a trust broker to a collection of named entities, which limits lateral movement within a network.

Forcepoint has 1 product in Zero Trust Network Access (Transitioning to Security Service Edge) market
  • Forcepoint ONE
    4.4
    26 Reviews
Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.
This site is protected by hCaptcha and its Privacy Policy and Terms of Service apply.
  • Community Guidelines
  • Listing Guidelines
  • Browse Vendors
  • Rules of Engagement
  • FAQ
  • Privacy
  • Terms of Service
©
 
©