
Overview
Forcepoint NGFW (Next-Generation Firewall) delivers unparalleled scalability, robust protection, and comprehensive visibility to efficiently manage and secure traffic flowing into and out of your AWS network, as well as within various components of your cloud environment. By integrating advanced application control, sophisticated evasion prevention, and a leading Intrusion Prevention System (IPS) into a unified solution, Forcepoint NGFW streamlines security management across your data center, office, and branch firewalls from a single console. Independent testing highlights Forcepoint NGFW's superior capability in stopping Advanced Evasion Techniques (AETs) compared to other security devices, its effectiveness in blocking vulnerability exploits, and its sandboxing technology for identifying zero-day attacks and advanced malware. Additionally, Forcepoint NGFW offers robust protection against the exfiltration of sensitive data, ensuring a comprehensive defense for your network.
Highlights
- Effortlessly extend your network to AWS cloud via secure virtual private network (VPN) gateway connecting remote sites, branch offices, and more.
- Safeguard your virtualized network against advanced attacks with dynamic security controls application layer exfiltration security and advanced evasion techniques (AETs) identification.
- Express your business processes as technical controls quickly and naturally with Forcepoint's unique Smart Policies that can be updated globally in seconds, not minutes or hours.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Dimension | Cost/hour |
|---|---|
c6i.xlarge Recommended | $0.80 |
c5.18xlarge | $14.40 |
c5n.4xlarge | $3.20 |
c6in.8xlarge | $6.40 |
c7i.8xlarge | $6.40 |
c5n.2xlarge | $1.60 |
c6i.8xlarge | $6.40 |
c6i.16xlarge | $12.80 |
c4.xlarge | $0.80 |
c5.9xlarge | $7.20 |
Vendor refund policy
You may terminate the instance at any time to stop incurring charges. There is no refund for charges incurred prior to termination.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Additional details
Usage instructions
To perform the initial configuration, use SSH and the username 'aws', then type 'sudo sg-reconfigure'. You can also give initial contact file engine.cfg via userdata encoded in base64. For additional information and configuration instructions see https://help.forcepoint.com/docs/ngfw/howto/ngfw_ht_deploy-ngfw-in-aws_en-us.pdf
Support
Vendor support
Your subscription includes Forcepoint Premium Support, with 24x7 support for critical issues, Severity 1 response targets of 45 mins or less, and an online technical support site offering extensive support resources and request tracking.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

Standard contract
Customer reviews
Advanced traffic controls have supported complex security needs but have highlighted interface and reliability gaps
What is our primary use case?
I am dealing with Forcepoint Next Generation Firewall from the business perspective, specifically from the pre-sales perspective and solution architecture. My company is not using Forcepoint Next Generation Firewall , but my customers are.
What is most valuable?
Forcepoint Next Generation Firewall's IPS feature has four operational modes, including IPS, Layer 2 and Layer 3 Firewalls . The IPS mode offers many controls, profiles, and signatures for inspecting traffic. It allows for applying firewall rules followed by IPS engine inspection. With Forcepoint Next Generation Firewall, many decisions including blocking and controlling traffic actions are possible. They also offer a CASB cloud access security broker and a cloud-based firewall, promoting cloud-native capabilities.
What needs improvement?
I am not certain if they could simplify their interface, because Forcepoint Next Generation Firewall is already built software. It could be compared with some well-known vendors such as Palo Alto. Palo Alto does not have an easy interface to be managed, especially if you are applying many profiles and many controls.
Forcepoint Next Generation Firewall should make some improvements because there is some instability with their software. Sometimes it could lag or become over-utilized. You need to clear some caches and do some restarts. This instability is problematic. Sometimes some traffic is being blocked, and the reason is not entirely clear.
When you apply some traffic rules with Forcepoint Next Generation Firewall, sometimes you feel you have to do more improvements. For example, if I want to block the Facebook application, several things should be in place so that you can consider this part. This is not easy to be implemented as a rule.
For how long have I used the solution?
I have been using this solution for around nine years.
What do I think about the stability of the solution?
Forcepoint Next Generation Firewall should make some improvements because there is some instability with their software. Sometimes it could lag or become over-utilized. You need to clear some caches and do some restarts. This instability is problematic. Sometimes some traffic is being blocked, and the reason is not entirely clear. This is why we sometimes suffer with Forcepoint Next Generation Firewall.
What other advice do I have?
Forcepoint Next Generation Firewall is for people who have skills. The customer should have a good skilled team to operate this solution because it is not that easy. It could be compared with Palo Alto in terms of difficulty. The technical team should be skilled to manage it. The customer scale differs from industry to industry, but they are dealing with medium businesses and have a competitive cost, so it is an affordable technology.
For non-experienced people, skilled people are required to manage Forcepoint Next Generation Firewall because it has many dashboards, many customizations, fine-tuning, and principles, so it requires skilled management.
I have not used secure SD-WAN for remote workforces before, but this feature is already in place and is used extensively.
I would rate this product a 6 out of 10.
Centralized control has simplified secure branch connectivity and improved remote access
What is our primary use case?
The main use case for Forcepoint Next Generation Firewall is not just the installation but to offer or suggest an architecture, showing how to use it basically on the edge of the customer's network.
What is most valuable?
I appreciate Forcepoint Next Generation Firewall for its capability to use VPN tunnels between branches, especially if they are under the same management center of Forcepoint. It is really easy and nice to use. You can do a route-based VPN tunnel as well as policy-based VPN tunnels between branches and some central point.
I have some experience with the IPS feature of Forcepoint Next Generation Firewall. It is a feature you can use to observe the traffic and identify bad behavior on the network. This is a passive function that allows you to identify traffic, and in the next step, you can cancel or discard this traffic.
The centralized management console of Forcepoint Next Generation Firewall is really helpful. You can manage all the firewalls in just one control center, and you can use around twenty firewalls and have them under one. It is really nice to have this feature, far better than having to connect to all the firewalls separately.
I am using the Secure SD-WAN feature for remote workforces, and it is a really good feature. You can have more than one tunnel to other branches and use those tunnels. One of them could be standby while the other is active, and they can both be active as well to split the traffic and use more speed.
URL filtering is very helpful in blocking malicious sites in Forcepoint Next Generation Firewall, especially when you have end-users who browse dangerous or improper sites from work or office computers. You can monitor and block this traffic.
What needs improvement?
I found one problem with Forcepoint Next Generation Firewall. They still do not have any VPN clients for Windows computers with ARM processors. This has started to become a problem because we have some clients who have notebooks with ARM processors, and we do not have the VPN client for them. There is a VPN client, a Forcepoint VPN client for the Windows platform, but in these days, you can have a Windows notebook with an ARM processor.
For how long have I used the solution?
I have been using Forcepoint Next Generation Firewall for almost five or six years.
What do I think about the scalability of the solution?
Forcepoint Next Generation Firewall is really good and scalable because there is one really good aspect. Even if you have some firewalls in the cluster, it is not necessary to have them on the same version. This is really nice if you are doing upgrades because you can do it step by step. Every time if you need more capability for traffic, you can also put another firewall to the cluster. It is really scalable.
How are customer service and support?
Generally, for Forcepoint, the customer support and customer service might be better, but especially for the firewalls, it is quite good. It is better than other technologies of Forcepoint.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I started with firewalls with Forcepoint Next Generation Firewall.
How was the initial setup?
Installation of Forcepoint Next Generation Firewall on-premise is quite straightforward.
Which other solutions did I evaluate?
Forcepoint Next Generation Firewall is quite affordable. I would say that it is cheaper than other brands like Palo Alto or Check Point. It has a lot of capabilities and is very stable. It is also very well-made. For its price, I suppose that it is still good, even though I know that their prices are rising a little bit, but still it is better than Palo Alto, for example.
For its price, Forcepoint Next Generation Firewall is a really good product when compared to other vendors.
What other advice do I have?
Improved network segmentation has reduced lateral movement while the interface still needs modernization
What is our primary use case?
My main use case for Forcepoint Next Generation Firewall has been network security and segmentation, relying on it most for remote access and threat prevention as a strong secondary role. The primary use case is perimeter and internal network security, and secondary use cases include site-to-site and branch connectivity using IPsec VPN tunnels, remote access using SSL remote access, and threat prevention by using it as an IPS, malware inspection, and reputation filtering.
I worked with a customer at a large enterprise where they had a core data center, a DMZ network, and internal business apps, with a sensitive finance system. With Forcepoint Next Generation Firewall , I designed a strict zone-based segmentation model, from internet to DMZ, then from DMZ to application tier, from application tier to database tier, and from user LAN into internal services. I used granular firewall policies so that only specific protocols, specific ports, and destinations were allowed, with explicit deny by default between the zones unless enabled by the granular firewall policies. I enabled application identification, blocking non-business traffic even if it was using allowed ports, and tagged each application on every policy. Lateral movement risk was massively reduced, and the organization passed internal security audits with zero critical findings, so the policies were very clean and readable. Forcepoint Next Generation Firewall's policy engine is very strong here and very user-friendly.
What is most valuable?
For threat prevention, I noticed on another customer that there were repeated scanning and exploit attempts against some public-facing service running on HTTPS. I configured Forcepoint Next Generation Firewall to handle IPS by enabling it with critical and high severity signatures only to reduce false positives. I turned on IP reputation filtering to filter out known malicious networks, applied rate limiting on specific services in the DMZ, and logged events centrally for correlation. As a result, exploit attempts were much less than before, being blocked before reaching the back-end servers from the firewall itself, with no performance degradation on the applications. The security team received clear and actionable logs that were centralized, so they knew what was happening all the time.
Strong network segmentation is my favorite feature that Forcepoint Next Generation Firewall offers. The policies are very deterministic and readable, and it has excellent east-west blocking and least privilege architecture. Application awareness identifies traffic beyond just the port itself; I can identify the application using a specific port and block risky applications even if they use allowed ports, which is great for environments with shadow IT. The integrated threat prevention is also very good, with IPS featuring well-tuned signatures and reputation-based filtering that blocks known bad actors before they can touch any applications. It supports both IPsec and SSL VPN tunnels, along with site-to-site, client-to-site, and hybrid cloud links, integrating well with Active Directory and LDAP. Additionally, centralized log management and reporting are very actionable and structured, with clarity in the policies for auditing. Overall, its stability and reliability are commendable.
A real example of how Forcepoint Next Generation Firewall's readable policies and application awareness features made my work easier was fixing a flat network problem without breaking actual applications. I inherited an environment where users, application servers, and databases were loosely segmented, with port-based and messy firewall rules. Security audits flagged lateral movement risks, and application owners were scared of outages if I tightened security too much. Forcepoint Next Generation Firewall made it easy by providing very easy-to-read and logical policies. I built policies that are clear, showing communications from the user zone to the application zone to specific applications, or from the app zone to the database zone, using only required database protocols. By default, I applied a deny rule between zones unless explicitly allowed by the readable rules I implemented. The policy view clarified who talks to whom, which rules exist, why they exist, and the business function they support, effectively stopping port abuse.
Security posture has definitely improved greatly since using Forcepoint Next Generation Firewall. From a flat or semi-flat network, I now have clear zone-based segmentation, with increased operational efficiency. The admins using the firewall have rules that are easy to read and intent-based, making changes easier to review and approve. There is less fear that one wrong rule could break production and fewer outages caused by security changes, without hidden matches or rule shadowing surprises. Clear hit count visibility helps me clean unused rules, leading to much fewer outages caused by changes on the firewalls. The centralized log management with supported log types provides better visibility for the SOC team and the SIEM team, as Forcepoint Next Generation Firewall sends very easy-to-parse and search clear logs to the SOC team.
I did see measurable, defensible results after using Forcepoint Next Generation Firewall, including fewer security incidents reaching the back-end servers. This reduction is due to strong segmentation, application awareness, and IPS features, leading to a 60 to 70 percent reduction in security alerts that actually reach the servers. DMZ exploit attempts dropped to near zero, and no lateral movement incidents were detected post network segmentation. Additionally, overall SOC efficiency improved due to well-structured and contextual logs reflecting clear policy intent, resulting in a 35 to 40 percent reduction in mean time to triage. SOC analysts stopped chasing noise and false positives, as they had much clearer logs to use confidently.
What needs improvement?
Forcepoint Next Generation Firewall can be improved, perhaps in the user interface and policy management. While the policies are easy to read, the UI feels a bit dated and sometimes clunky on certain pages. Editing rules can feel complex due to the need for multiple clicks and screens. To improve, I suggest modernizing the policy UI with drag-and-drop capabilities for rules, a policy diff impact preview before committing changes, and offering more intuitive rule tagging and labeling.
For how long have I used the solution?
I have been using Forcepoint Next Generation Firewall for five years.
What do I think about the stability of the solution?
Forcepoint Next Generation Firewall is stable in my experience.
What do I think about the scalability of the solution?
Forcepoint Next Generation Firewall's scalability is very good; I can have one management node similar to Palo Alto Panorama, with multiple nodes covering different sites, data centers, or zones, enabling extensive deployment in different environments.
How are customer service and support?
Customer support for Forcepoint Next Generation Firewall is standard support: I open a ticket, wait a bit, and an agent connects with me. It is level one support, and if there is a complex incident or issue, I wait for escalation to level two and so on. I would give it a three out of five.
How would you rate customer service and support?
Neutral
How was the initial setup?
I had multiple options concerning the licensing model for Forcepoint Next Generation Firewall. One option is perpetual plus support, which feels like a classic enterprise licensing model with predictable upfront costs. Another is the subscription model offering feature or security bundles, which feels flexible but requires discipline to manage costs. There is also the option in the AWS Marketplace to deploy as pay-as-you-go, leading to hourly billing with licenses included, or bring your own license to AWS and attach it. Pay-as-you-go is simple for temporary use or proof of concept, while bring your own license typically saves money long-term.
What was our ROI?
I did see a return on investment with Forcepoint Next Generation Firewall, as mentioned by the efficiency improvements and the metrics related to how much I cut investigation time, the number of incidents, and the ease of making changes or pushing new configurations. I overall save on costs by needing fewer people to manage it and fewer decision-makers involved.
Which other solutions did I evaluate?
I evaluated other options prior to choosing Forcepoint Next Generation Firewall, including Palo Alto, Fortinet, and Check Point Firewall.
What other advice do I have?
Forcepoint Next Generation Firewall is very solid and strong at the fundamentals that enterprises rely on, but it lags behind market leaders in a few modern areas. The policy clarity and segmentation are noteworthy strengths of Forcepoint Next Generation Firewall, along with stability, predictability, and effective threat prevention without noise, making it enterprise-friendly. However, the UI and UX feel a little dated, while cloud-native capabilities are somewhat limited. It works on AWS , for example, but is not cloud-first based, lacking deep integration with cloud constructs such as security group tags and automated automation tooling, which are stronger in other competitors. Additionally, while user identity and analytics depth is good, user-centric visibility is somewhat weak, and the ecosystem and innovation pace are smaller compared to competitors such as Fortinet or Palo Alto.
I advise those looking into using Forcepoint Next Generation Firewall to deploy it as a pay-as-you-go option for a few days, using it for proof of concept to explore the GUI, features, and capabilities to get accustomed to it. If they are comfortable with a classic GUI that is not as modern as other options such as Palo Alto, they should remember that the core features are very strong. It is a very stable product, so I suggest they seek out other customers with existing deployments of Forcepoint Next Generation Firewall and ask about their experiences before making the decision to use it themselves. Overall, it is an excellent product, highly reliable, and among the top contenders; Forcepoint Next Generation Firewall is well known. I gave Forcepoint Next Generation Firewall a 7.5 out of 10.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Centralized management has strengthened our perimeter security and consistently reduced downtime
What is our primary use case?
My main use case for Forcepoint Next Generation Firewall is to manage the security perimeter.
A quick, specific example of how I use Forcepoint Next Generation Firewall to manage my security perimeter involves making inspection, NAT, and ACL .
In addition to managing the security perimeter with Forcepoint Next Generation Firewall, we also need to manage the SD-WAN functionality and VPN intra-site.
What is most valuable?
Forcepoint Next Generation Firewall offers excellent features including a centralized management console and log feature.
I appreciate the centralized management console and the log feature because the logs are clear and easy to use, which helps my daily work.
I would also add that the load balancing feature and the active-active functionality are notable aspects of Forcepoint Next Generation Firewall.
Forcepoint Next Generation Firewall has positively impacted my organization by providing always-on perimeter security.
Always-on functionality for my organization means it has reduced the downtime.
What needs improvement?
Forcepoint Next Generation Firewall can be improved with better response from support.
I do not have anything more to add about the needed improvements, especially regarding the interface or other technical aspects.
For how long have I used the solution?
Forcepoint Next Generation Firewall is deployed in my organization on-premises.
What do I think about the stability of the solution?
Forcepoint Next Generation Firewall is stable.
What do I think about the scalability of the solution?
Forcepoint Next Generation Firewall has good scalability.
How are customer service and support?
Regarding customer support, last year it was not as good or quick, but the last call and ticket raised seemed to be better.
I would rate the customer support a seven.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, I used a Cisco Firewall, and I switched to Forcepoint Next Generation Firewall because of the central management and the deep log information.
How was the initial setup?
My experience with pricing, setup cost, and licensing has been in line with the market.
What was our ROI?
I have seen a return on investment with time saved and also fewer employees needed.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing has been in line with the market.
Which other solutions did I evaluate?
Before choosing Forcepoint Next Generation Firewall, I also evaluated the Check Point solution.
What other advice do I have?
I would rate Forcepoint Next Generation Firewall a nine on a scale of one to ten.
I give it a nine because support is not always very speedy, which stops me from giving it a ten.
My overall review rating for Forcepoint Next Generation Firewall is nine.
Manages over 1,500 locations from a central console and simplifies policy deployment
What is our primary use case?
Forcepoint Next Generation Firewall was implemented for SD-WAN solutions across all 1,500 plus locations. The deployment includes routing and BGP routing, L3 switching, L2 switching, and site-to-site VPN and SSL VPNs. IPS enabled antivirus applications, IPS, IDS, application control, and quality of service are also included. All firewalls are managed through the SMC, which is the Security Management server center. Overall, no issues have been encountered, but there are some dependencies on the SMC components. Occasionally, connectivity challenges between Forcepoint Next Generation Firewall and SMC have been observed. It is important to ensure that licenses are renewed before expiring, as no modifications are allowed after the license expires.
Forcepoint Next Generation Firewall policies are created with source IP and applications policy configurations. Some routing and BGP routing have been added, and new locations have been added. All firewalls are synced with the SMC.
Forcepoint Next Generation Firewall provides excellent SD-WAN solutions. It is very easy to connect Wi-Fi solutions and any other interface solutions. Both on-premise solutions and hybrid solutions are available. It can be easily integrated with different solutions.
What is most valuable?
Forcepoint Next Generation Firewall provides excellent SD-WAN solutions that make it very easy to connect Wi-Fi solutions and any other interface solutions. Both on-premise solutions and hybrid solutions are available, and it can be easily integrated with different solutions.
Forcepoint Next Generation Firewall has positively impacted the organization. Previously, it was very difficult to handle all traffic because multiple locations experienced downtime, firewalls went down, and internet connectivity issues occurred. There was a lease line option previously, which was very critical for connectivity. After Forcepoint SD-WAN solutions were deployed across different locations, all traffic goes through Wi-Fi solutions, which are directly connected to Forcepoint Next Generation Firewall. This is very easy, time-saving, and has improved security. Forcepoint Next Generation Firewall has many security solutions available. There is no doubt that it is a good firewall. All types of policies can be created, and all GFW features are available. All those security solutions can be utilized.
What needs improvement?
Forcepoint Next Generation Firewall is overall good, but AI enabled features are not available. Many templates and AI security features are needed and are currently missing.
For how long have I used the solution?
I have been working with Forcepoint Next Generation Firewall for the last four years. I have worked with all types of Forcepoint products, including Forcepoint DLP , Forcepoint endpoint solutions, Forcepoint web security, and Forcepoint Next Generation Firewall. There is a deep understanding of all Forcepoint products.
What do I think about the stability of the solution?
Forcepoint Next Generation Firewall is stable based on this experience.
What do I think about the scalability of the solution?
Forcepoint Next Generation Firewall's scalability is good and can handle growth or increased demand easily.
How are customer service and support?
The experience with Forcepoint Next Generation Firewall customer service has been very good. TAC engineers are very experienced and troubleshoot issues within the expected timeframe with no problems.
How would you rate customer service and support?
Positive
How was the initial setup?
Forcepoint Next Generation Firewall has a boot option and is very easy to deploy, taking very little time. Only one boot is required, or a pen drive can be inserted and booted, then rebooted, and it will automatically connect the firewall with the SMC. Policies can be easily published through SMC. The firewall can be deployed within 20 minutes.
What about the implementation team?
In this organization, five people manage 1,500 plus locations with Forcepoint Next Generation Firewall. This reduces the number of employees, saves time, and reduces costs. This is a good consideration.
What was our ROI?
Forcepoint Next Generation Firewall provides cost savings with minimal costs. It does not have high pricing for on-premise solutions and on-cloud solutions. It is easy and offers different solutions for each solution type with small, mid, and large scale options available. This makes it easy to choose the appropriate firewall and minimize costs and save money.
What other advice do I have?
Forcepoint Next Generation Firewall is an excellent firewall with many next-generation features, including IPS, IDS, application console, UTM, quality of service, DDoS protections, and deep packet inspections. All types of VPN connectivity and routing are available. It is very easy to understand and deploy. The only issue that has been observed is related to licensing. It is important to ensure that licenses are renewed before expiration, as no modifications are allowed after the license expires. This would be helpful for users and clients. Forcepoint Next Generation Firewall has only two components: SMC and Forcepoint Next Generation Firewall. Overall, the rating for Forcepoint Next Generation Firewall is 10 out of 10.
