Top Rated Forcepoint ONE Cloud Access Security Broker (CASB) Alternatives
(43)
4.7 out of 5
Visit Website
Sponsored
1 Forcepoint ONE Cloud Access Security Broker (CASB) Reviews
4.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
Here's how.
We strive to keep our reviews authentic.
G2 reviews are an important part of the buying process, and we understand the value they provide to both our customers and buyers. To ensure the value is retained, it's important to make certain that reviews are authentic and trustworthy, which is why G2 requires verified methods to write a review and validates the reviewer's identity before approving. G2 validates the reviewers identity with our moderation process that prevents inauthentic reviews, and we strive to collect reviews in a responsible and ethical manner.

NK
Nitin K.
Technical Support engineer
Enterprise(> 1000 emp.)
What do you like best about Forcepoint ONE Cloud Access Security Broker (CASB)?
Forcepoint CASB Cloud Access Security Broker is the dedicated CASB solution by which we can control all the cloud applications.
Forcepoint CASB Cloud Access Security Broker does deep data analysis of every data. Forcepoint CASB Cloud Access Security Broker can read data format. Review collected by and hosted on G2.com.
What do you dislike about Forcepoint ONE Cloud Access Security Broker (CASB)?
regex needs to be configured in policies. sometimes uploaded data not matching to regex Forcepoint CASB Cloud Access Security Broker will allow to access. Review collected by and hosted on G2.com.
There are not enough reviews of Forcepoint ONE Cloud Access Security Broker (CASB) for G2 to provide buying insight. Below are some alternatives with more reviews:
1
Symantec Web Security Service
4.4
(123)
Symantec Web Security is a cloud based software that helps protect organization from compromised websites and malicious downloads and allows user to control, monitor and enforce Acceptable Use Policies for organizations users, whether on-premises or away from the office.
2
Check Point Harmony SASE
4.7
(116)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
3
Cloudflare SSE & SASE Platform
4.6
(92)
Cloudflare Area 1 Security identifies and prevents advanced socially engineered attacks before they impact your enterprise.
4
Microsoft Defender for Cloud Apps
4.4
(59)
Microsoft Defender for Cloud Apps is an enterprise-grade security for cloud apps.
5
Harmony Email & Collaboration
4.5
(76)
Check Point Harmony Email & Office, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.
6
Cato SASE Cloud
4.4
(75)
Cato SASE Cloud delivers a global SD-WAN with built-in network security stack for all enterprise locations, cloud resources and mobile users
7
Citrix Secure Workspace Access
4.5
(71)
Citrix Secure Workspace Access provides a comprehensive, zero-trust approach to deliver secure and contextual access to the corporate internal web apps, SaaS, and virtual applications.
It enables the consolidation of traditional security products like VPN, single sign-on, and browser isolation technologies and provides advanced security controls for managed, unmanaged, and BYO devices.
Citrix Secure Workspace Access provides a holistic security approach based on zero-trust principles, protecting users, applications, and corporate data against internet web threats and data exfiltration.
8
Lookout
4.3
(69)
Lookout is a mobile app that fights cybercriminals by predicting and stopping mobile attacks before they do harm.
9
Netskope One Platform
4.4
(56)
Netskope is a Cloud Access Security Broker (CASB)
10
Citrix Workspace
4.4
(55)
Citrix Workspace Essentials provides a comprehensive, zero-trust approach to deliver secure and contextual access to corporate internal web apps, SaaS, and virtual applications.
With Citrix Workspace Essentials, IT can consolidate traditional security products such as VPN, single-sign on, multi-factor authentication, and provide usage analytics for Web and SaaS apps.
Citrix Workspace Essentials provides end-users with simplified, secure, and VPN-less access to Web apps, SaaS, virtualized apps, and data.
Forcepoint CASB Cloud Access Security Broker Categories on G2