Introducing G2.ai, the future of software buying.Try now
Cato SASE Cloud
Sponsored
Cato SASE Cloud
Visit Website
Product Avatar Image
Forcepoint Cloud Access Security Broker (CASB)

By Forcepoint

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at Forcepoint Cloud Access Security Broker (CASB) and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
4.5 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Forcepoint Cloud Access Security Broker (CASB)?

Cato SASE Cloud
Sponsored
Cato SASE Cloud
Visit Website
It's been two months since this profile received a new review
Leave a Review

Forcepoint Cloud Access Security Broker (CASB) Reviews & Product Details

Forcepoint Cloud Access Security Broker (CASB) Integrations

(1)
Integration information sourced from real user reviews.
Product Avatar Image

Have you used Forcepoint Cloud Access Security Broker (CASB) before?

Answer a few questions to help the Forcepoint Cloud Access Security Broker (CASB) community

Forcepoint Cloud Access Security Broker (CASB) Reviews (2)

Reviews

Forcepoint Cloud Access Security Broker (CASB) Reviews (2)

4.5
2 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Vinay S.
VS
Cybersecurity Engineer
Consulting
Small-Business (50 or fewer emp.)
"Securing the Cloud with Confidence: A Review of Forcepoint ONE CASB"
What do you like best about Forcepoint Cloud Access Security Broker (CASB)?

Forcepoint ONE CASB seamlessly integrates with Forcepoint’s industry-leading DLP engine, allowing unified policy enforcement across cloud apps, web, and private apps—all from a single console. Also, The contextual awareness (user, device, app, activity) helps in applying adaptive controls, making it especially powerful for remote and hybrid work environment. The support from Forcepoint team is exceptional. Making it easy to use, implement and resolve issues. Review collected by and hosted on G2.com.

What do you dislike about Forcepoint Cloud Access Security Broker (CASB)?

While the platform offers rich features and granular controls, the initial setup and policy configuration can be complex, especially for teams without prior experience in CASB or Forcepoint’s ecosystem. Some users have reported that it takes time to fully understand and optimize the unified policy framework and integrations Review collected by and hosted on G2.com.

Nitin  K.
NK
Technical Support engineer
Enterprise (> 1000 emp.)
"Forcepoint CASB Cloud Access Security Broker"
What do you like best about Forcepoint Cloud Access Security Broker (CASB)?

Forcepoint CASB Cloud Access Security Broker is the dedicated CASB solution by which we can control all the cloud applications.

Forcepoint CASB Cloud Access Security Broker does deep data analysis of every data. Forcepoint CASB Cloud Access Security Broker can read data format. Review collected by and hosted on G2.com.

What do you dislike about Forcepoint Cloud Access Security Broker (CASB)?

regex needs to be configured in policies. sometimes uploaded data not matching to regex Forcepoint CASB Cloud Access Security Broker will allow to access. Review collected by and hosted on G2.com.

There are not enough reviews of Forcepoint Cloud Access Security Broker (CASB) for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Check Point Harmony SASE Logo
Check Point Harmony SASE
4.6
(152)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
2
Symantec Web Security Service Logo
Symantec Web Security Service
4.4
(120)
Symantec Web Security is a cloud based software that helps protect organization from compromised websites and malicious downloads and allows user to control, monitor and enforce Acceptable Use Policies for organizations users, whether on-premises or away from the office.
3
Harmony Email & Collaboration Logo
Harmony Email & Collaboration
4.6
(113)
Check Point Harmony Email & Office, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.
4
Cloudflare SSE & SASE Platform Logo
Cloudflare SSE & SASE Platform
4.6
(103)
Cloudflare Area 1 Security identifies and prevents advanced socially engineered attacks before they impact your enterprise.
5
Cato SASE Cloud Logo
Cato SASE Cloud
4.4
(82)
Cato SASE Cloud delivers a global SD-WAN with built-in network security stack for all enterprise locations, cloud resources and mobile users
6
Netskope One Platform Logo
Netskope One Platform
4.4
(66)
Netskope is a Cloud Access Security Broker (CASB)
7
Prisma Access Logo
Prisma Access
4.3
(73)
Secure access service edge (SASE) for branch offices, retail locations and mobile users
8
Microsoft Defender for Cloud Apps Logo
Microsoft Defender for Cloud Apps
4.4
(53)
Microsoft Defender for Cloud Apps is an enterprise-grade security for cloud apps.
9
Citrix Secure Private Access Logo
Citrix Secure Private Access
4.5
(69)
Citrix Secure Workspace Access provides a comprehensive, zero-trust approach to deliver secure and contextual access to the corporate internal web apps, SaaS, and virtual applications. It enables the consolidation of traditional security products like VPN, single sign-on, and browser isolation technologies and provides advanced security controls for managed, unmanaged, and BYO devices. Citrix Secure Workspace Access provides a holistic security approach based on zero-trust principles, protecting users, applications, and corporate data against internet web threats and data exfiltration.
10
Citrix Workspace Logo
Citrix Workspace
4.4
(58)
Citrix Workspace Essentials provides a comprehensive, zero-trust approach to deliver secure and contextual access to corporate internal web apps, SaaS, and virtual applications. With Citrix Workspace Essentials, IT can consolidate traditional security products such as VPN, single-sign on, multi-factor authentication, and provide usage analytics for Web and SaaS apps. Citrix Workspace Essentials provides end-users with simplified, secure, and VPN-less access to Web apps, SaaS, virtualized apps, and data.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.