Introducing G2.ai, the future of software buying.Try now

Compare Forcepoint Data Security Cloud and Zscaler Internet Access

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Forcepoint Data Security Cloud
Forcepoint Data Security Cloud
Star Rating
(103)4.2 out of 5
Market Segments
Enterprise (50.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Forcepoint Data Security Cloud
Zscaler Internet Access
Zscaler Internet Access
Star Rating
(166)4.4 out of 5
Market Segments
Enterprise (53.4% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Zscaler Internet Access
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Zscaler Internet Access excels in providing a seamless, cloud-delivered security experience, with users appreciating its URL Filtering Policies that allow for granular control over web access, significantly reducing the risk of accidental data leaks.
  • Users say that Forcepoint Data Security Cloud offers a user-friendly interface, making it easy to manage multiple security functions from a single platform. This integration helps streamline security processes, as highlighted by users who value its ability to encrypt both structured and unstructured data.
  • Reviewers mention that Zscaler Internet Access has a strong focus on performance and scalability, with many users noting its ability to enforce security policies globally without the need for complex on-prem infrastructure, which enhances overall user experience.
  • According to verified reviews, Forcepoint Data Security Cloud is praised for its ease of implementation, with users highlighting the effective support they received during setup, which contributed to a smooth onboarding process.
  • G2 reviewers indicate that Zscaler Internet Access outperforms in terms of support quality, with users rating it highly for responsiveness and helpfulness, particularly when addressing security concerns and policy enforcement.
  • Users report that while both products meet requirements effectively, Zscaler Internet Access tends to receive higher satisfaction ratings overall, particularly in areas like data visibility and incident logging, which are crucial for maintaining robust security postures.
Pricing
Entry-Level Pricing
Forcepoint Data Security Cloud
No pricing available
Zscaler Internet Access
No pricing available
Free Trial
Forcepoint Data Security Cloud
No trial information available
Zscaler Internet Access
No trial information available
Ratings
Meets Requirements
8.8
59
8.8
128
Ease of Use
8.6
61
8.7
131
Ease of Setup
8.5
41
8.5
85
Ease of Admin
9.0
38
8.8
49
Quality of Support
8.2
58
8.7
121
Has the product been a good partner in doing business?
8.9
37
8.9
46
Product Direction (% positive)
8.9
52
9.4
126
Features by Category
Not enough data
8.8
26
Sandbox
Not enough data
8.9
21
Evaluation
Not enough data
9.0
20
Not enough data
9.0
20
Not enough data
9.1
20
Not enough data
8.6
20
Data Loss Prevention (DLP)Hide 10 FeaturesShow 10 Features
8.4
14
9.1
35
Administration
8.7
13
9.1
27
8.3
13
9.0
28
9.2
12
9.0
27
Governance
8.1
13
9.3
28
8.5
13
9.2
26
8.6
13
9.2
28
Security
8.2
13
9.3
27
8.3
13
9.0
27
7.9
13
9.2
29
7.8
13
9.0
28
Not enough data
Not enough data
Network Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Access Security Broker (CASB)Hide 10 FeaturesShow 10 Features
8.2
14
Not enough data
Analysis
8.1
12
Not enough data
7.8
12
Not enough data
8.1
12
Not enough data
Functionality
8.5
12
Not enough data
8.3
12
Not enough data
8.0
11
Not enough data
Security
8.3
13
Not enough data
8.6
13
Not enough data
8.1
13
Not enough data
8.2
13
Not enough data
Not enough data
9.1
51
Administration
Not enough data
8.7
43
Not enough data
9.2
42
Not enough data
9.1
43
Not enough data
9.1
42
Agentic AI - Firewall Software
Not enough data
9.7
5
Not enough data
9.7
5
Functionality
Not enough data
9.2
40
Not enough data
9.0
40
Not enough data
9.2
42
Not enough data
9.1
41
Monitoring
Not enough data
9.0
43
Not enough data
9.1
42
Not enough data
9.3
43
Not enough data
9.2
42
Generative AI
Not enough data
8.1
16
Artificial Intelligence - Firewall
Not enough data
9.7
5
Software-Defined Perimeter (SDP)Hide 11 FeaturesShow 11 Features
Not enough data
8.5
10
Administration
Not enough data
8.3
8
Not enough data
8.3
8
Not enough data
8.3
9
Protection
Not enough data
8.9
9
Not enough data
9.3
9
Not enough data
9.0
8
Not enough data
8.8
8
Monitoring
Not enough data
8.7
9
Not enough data
8.8
8
Not enough data
8.8
8
Not enough data
8.5
8
9.2
8
Not enough data
Management
9.7
6
Not enough data
9.3
7
Not enough data
9.3
7
Not enough data
9.3
7
Not enough data
Monitoring
9.8
8
Not enough data
9.0
8
Not enough data
9.2
6
Not enough data
Protection
8.8
7
Not enough data
8.6
7
Not enough data
9.3
7
Not enough data
9.0
7
Not enough data
Not enough data
9.0
37
Web Content and Traffic Filtering - Secure Web Gateways
Not enough data
9.1
34
Not enough data
8.7
33
Not enough data
8.8
33
Not enough data
9.1
34
Not enough data
8.4
33
Data Protection and Loss Prevention - Secure Web Gateways
Not enough data
9.3
34
Not enough data
9.0
32
Not enough data
9.2
31
Not enough data
9.0
31
Access Control and Authentication - Secure Web Gateways
Not enough data
9.2
32
Not enough data
9.2
32
Not enough data
9.2
32
Performance and Management - Secure Web Gateways
Not enough data
8.8
36
Not enough data
8.9
31
Not enough data
8.7
32
Not enough data
8.7
35
Not enough data
8.9
32
Secure Access Service Edge (SASE) PlatformsHide 12 FeaturesShow 12 Features
Not enough data
Not enough data
Components - Secure Access Service Edge (SASE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence - Secure Access Service Edge (SASE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Secure Access Service Edge (SASE) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
9.2
8
Identity and Access Management - Zero Trust Platforms
Not enough data
9.2
6
Not enough data
9.2
6
Not enough data
9.4
6
Not enough data
9.2
6
Security - Zero Trust Platforms
Not enough data
10.0
6
Not enough data
8.9
6
Not enough data
9.4
6
Not enough data
9.2
6
Not enough data
9.7
6
Data Security - Zero Trust Platforms
Not enough data
10.0
7
Not enough data
9.7
6
Application Visibility - Zero Trust Platforms
Not enough data
8.6
6
Not enough data
9.2
6
Not enough data
9.4
6
Not enough data
8.6
6
Not enough data
9.2
6
Reporting and Policies - Zero Trust Platforms
Not enough data
9.2
6
Not enough data
9.7
6
Not enough data
9.8
7
Not enough data
9.0
7
Not enough data
8.9
6
Agentic AI - Zero Trust Platforms
Not enough data
8.6
6
Not enough data
8.1
6
Not enough data
9.2
6
Not enough data
9.2
6
Secure Service Edge (SSE) SolutionsHide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Components - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence -Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Forcepoint Data Security Cloud
Forcepoint Data Security Cloud
Zscaler Internet Access
Zscaler Internet Access
Forcepoint Data Security Cloud and Zscaler Internet Access are categorized as Data Loss Prevention (DLP), Zero Trust Platforms, and Secure Service Edge (SSE) Solutions
Reviews
Reviewers' Company Size
Forcepoint Data Security Cloud
Forcepoint Data Security Cloud
Small-Business(50 or fewer emp.)
11.0%
Mid-Market(51-1000 emp.)
39.0%
Enterprise(> 1000 emp.)
50.0%
Zscaler Internet Access
Zscaler Internet Access
Small-Business(50 or fewer emp.)
18.5%
Mid-Market(51-1000 emp.)
28.1%
Enterprise(> 1000 emp.)
53.4%
Reviewers' Industry
Forcepoint Data Security Cloud
Forcepoint Data Security Cloud
Information Technology and Services
19.0%
Computer & Network Security
15.0%
Media Production
12.0%
Computer Software
11.0%
Banking
11.0%
Other
32.0%
Zscaler Internet Access
Zscaler Internet Access
Information Technology and Services
23.3%
Computer Software
9.6%
Computer & Network Security
8.2%
Financial Services
6.8%
Hospital & Health Care
4.1%
Other
47.9%
Alternatives
Forcepoint Data Security Cloud
Forcepoint Data Security Cloud Alternatives
Check Point Harmony Email & Collaboration
Check Point Harmony Email & Collaboration
Add Check Point Harmony Email & Collaboration
BetterCloud
BetterCloud
Add BetterCloud
Check Point Next Generation Firewalls (NGFWs)
Check Point Next Generation Firewalls (NGFWs)
Add Check Point Next Generation Firewalls (NGFWs)
Cisco Duo
Cisco Duo
Add Cisco Duo
Zscaler Internet Access
Zscaler Internet Access Alternatives
Check Point Harmony SASE
Check Point Harmony SASE
Add Check Point Harmony SASE
Netskope One Platform
Netskope One Platform
Add Netskope One Platform
Absolute Secure Access
Absolute Secure Access
Add Absolute Secure Access
Check Point Next Generation Firewalls (NGFWs)
Check Point Next Generation Firewalls (NGFWs)
Add Check Point Next Generation Firewalls (NGFWs)
Discussions
Forcepoint Data Security Cloud
Forcepoint Data Security Cloud Discussions
Monty the Mongoose crying
Forcepoint Data Security Cloud has no discussions with answers
Zscaler Internet Access
Zscaler Internet Access Discussions
What is Zscaler Internet Access used for?
1 Comment
Naveen K.
NK
Block the unwanted access of websites where organizations control it from anywhere via this tool.Read more
Monty the Mongoose crying
Zscaler Internet Access has no more discussions with answers