Top Rated Forcepoint ONE Alternatives
98 out of 99 Total Reviews for Forcepoint ONE
Overall Review Sentiment for Forcepoint ONE
Log in to view review sentiment.

Forcepoint Insider threat is a powerful AI detection and prevention tool for the threats within the organization and it's easy to use for any admin or analysts. It's UEBA feature is very impactful as it gives the in-depth insight of User Behaviour across every channels including endpoint, email, network, cloud etc. Detects suspicious activities along with the suspicious behavious based on the real time pattern, Also the plus point is it automatically blocks the sensitive data uploads and everything which covers the DLP features. This Product provides the Risk Score by telling how much your organisation is safe and what's the overall risk index and also suggests the various steps to improve that. If we talk about integration, then this product is the best fit for any third party integrations and also applicable in co-exist mode. For internal or SI team, this product is easy to implement. Review collected by and hosted on G2.com.
Personally i don't dislike this product, as forcepoint already captured huge market for their Start Product like DLP. Review collected by and hosted on G2.com.
Behavioral analytics effectively identifies anamolous behaviour which reduces false positives.
Covers wide range of endpoints and platforms, ensuring thorough monitoring.
Detailed logging and investigation tool helps in understanding the full scope of incidents. Review collected by and hosted on G2.com.
Implementation and configuration can be complex.Also requires significant tuning to avoid large amount of alerts. Review collected by and hosted on G2.com.

I like the level of protection that comes from Forcepoint Dynamic Edge Protection, its coverage is more than sufficient. The systems advanced capabilities in threat detection and prevention have helped in securing our network. It is quite easy to deploy because it is cloud based, which makes it easy to grow with the organization, and the implementation into the existing ecosystem was straightforward…Not to mention, the user interface is easy to understand which translates into better control of the security efforts. Review collected by and hosted on G2.com.
Forcepoint Dynamic Edge Protection is potent however; there is often a great care and time spent on diagnosing the problems which might be better utilized doing further improvements. There are also some advanced options that might require a little training for new users due to the learning curve. But once you’re able to actually use it, it’s a great additional tool in the overall security arsenal. Review collected by and hosted on G2.com.
As per my usage Force Point Data analyzer so far is the easiast to use and implement in the organization. Its integration with various products was a plus point as it helped me and my team be more productive and using all the features to its full potential Review collected by and hosted on G2.com.
During the time of my usage the customer support was not really responsive. It might be because of the communication gaps but customer support was not that helpful during my usage. That could be one of the reason the frequency of my usage was not that long. Review collected by and hosted on G2.com.

Easy deployment, easy integration with MDM, single click installation, deployed it with good customer services, using it on daily basis Review collected by and hosted on G2.com.
A little but new for any professional guy, need a lil bit training for administration. Review collected by and hosted on G2.com.

I like this product as it gives very refined level of control to protect our data Review collected by and hosted on G2.com.
This is very useful as gives give different verticals protection and support for data losses Review collected by and hosted on G2.com.
With Forcepoint Insider Threat, you can save time and effort as it automatically scores and prioritizes your riskiest users, eliminating the need to go through thousands of alerts. Review collected by and hosted on G2.com.
It's a reliable tool, but the free features have some restrictions. If you're looking to unlock the more advanced options, you'll need to invest some additional money. Review collected by and hosted on G2.com.

One of the best DLP solution offer by forcepoint. It is ease of use and very easy to implement we have been continously doing testing and looking forward to have it in our product bucket. Integration is easy to be done and support also gives an full time assistance if there is an issue regarding the product implementation Review collected by and hosted on G2.com.
Until now there is no issue only we find little complex during scaling the environment Review collected by and hosted on G2.com.

It has very comphrensive monitiring also offeres a high degree of customization.
Easy to use and implementation. Review collected by and hosted on G2.com.
Extesive monitoring capabilities may impact system performance. Review collected by and hosted on G2.com.
Forcepoint Data Guard has a very decent user interface. What I like best is the flexibility, scalability, integration, training and support, and real-time monitoring and reporting. Review collected by and hosted on G2.com.
Forcepoint Data Guard sometimes generate false positives, flagging legitimate activities or files as security risks. Review collected by and hosted on G2.com.