Reviews from AWS customer

5 AWS reviews

External reviews

6 reviews
from

External reviews are not included in the AWS star rating for the product.


5-star reviews ( Show all reviews )

    Manish Kumar Twinkle

Secure browsing and cloud use have protected data and improved visibility into user activity

  • December 22, 2025
  • Review from a verified AWS customer

What is our primary use case?

My main use case for Forcepoint ONE is SWG and CASB.

For my use case of Forcepoint ONE, we protect our data on the browser using SWG by granting or denying access to users based on web reputations, URLs, and category-based URLs, and we can restrict access if any user downloads something malicious through scanning. For CASB, we have integrated our Office 365 with CASB to protect our sensitive data shared with other users from Office 365 mail and Teams.

Forcepoint ONE essentially prevents or secures our users from accessing public domains without hesitation, ensuring that we scan all activities.

What is most valuable?

The best features that Forcepoint ONE offers are RBI and CDR in SWG.

RBI helps me specifically by removing all the malicious JavaScript codes from websites that users might visit, allowing them to access the URL without encountering the actual malicious codes. Regarding CDR, when a user downloads malicious executable files or something injected with malicious codes, CDR assists by creating the same package with other files, effectively removing the original malicious content.

I love the features of SWG and RBI because they secure our users by removing JavaScript and malicious file codes, particularly since many attackers employ codeless or fileless patterns or signatureless attacks. Additionally, if any user is uncertain about any data or its origin, CrowdStrike anti-malware sensors scan it for us. CDR is crucial as it protects our end users from unknown third-party files, ensuring the authenticity of shared files.

Forcepoint ONE has positively impacted our organization by providing visibility through CASB, caching user activities, and preventing threats by guiding users to the correct cloud services like Office 365 instead of blocking access to more vulnerable services.

What needs improvement?

Forcepoint ONE can be improved with better guidance on token implementation for ease of use.

While implementing Forcepoint ONE has been very smooth and efficient, the proof of concept phase can be slow, particularly on S3. It would be beneficial for end users if performance improves during this stage.

For how long have I used the solution?

I have been working in my current field for three years, so I have three years of experience.

What do I think about the stability of the solution?

Forcepoint ONE is very stable.

Forcepoint ONE runs smoothly, and scaling is easy. When we need more licenses, we simply request them, which we have done after utilizing it for 1.5 years.

What do I think about the scalability of the solution?

Forcepoint ONE runs smoothly, and scaling is easy. When we need more licenses, we simply request them, which we have done after utilizing it for 1.5 years.

How are customer service and support?

Customer support is quite good. After raising a case on the support portal, I call the support number to prioritize it, and an engineer comes to resolve the issue.

Which solution did I use previously and why did I switch?

We have not previously used a different solution.

How was the initial setup?

With Forcepoint ONE, we can import firewall logs, resulting in Shadow IT reports that give us visibility into our data's movement, enabling us to block or allow operations effectively.

We are using AWS and Azure as our cloud providers.

We are utilizing Forcepoint ONE directly from Forcepoint OEM as partners, so we do not purchase it from the AWS Marketplace.

What about the implementation team?

We are utilizing Forcepoint ONE directly from Forcepoint OEM as partners, so we do not purchase it from the AWS Marketplace.

What was our ROI?

We have seen a return on investment with Forcepoint ONE. It saves us money and time as all metrics can be achieved through a single console, which simplifies employee training and implementation.

What's my experience with pricing, setup cost, and licensing?

The aspects of pricing, setup cost, and licensing are managed by our sales team, as I handle the technical side.

Which other solutions did I evaluate?

Before choosing Forcepoint ONE, we evaluated other options including Netskope and Zscaler.

What other advice do I have?

If your users frequently access unknown sites or use browsers extensively, you should definitely use SWG. If you are uncertain about your users' data origins—whether it is genuine or malicious—you should utilize features such as CDR and RBI to prevent upcoming threats. If you are on a cloud platform without data visibility, integrating Forcepoint ONE will give you control over your SaaS data.

Forcepoint ONE has positively impacted our organization by providing visibility through CASB, caching user activities, and preventing threats by guiding users to the correct cloud services like Office 365 instead of blocking access to more vulnerable services.

I would rate this product and experience a 10 out of 10.


showing 1 - 1