No more typing reviews! Try our Samantha, our new voice AI agent.

BigID Next vs Forcepoint Risk Adaptive Protection for DLP comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Jan 22, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare One
Sponsored
Ranking in Data Loss Prevention (DLP)
20th
Average Rating
8.6
Reviews Sentiment
6.5
Number of Reviews
23
Ranking in other categories
Email Security (20th), Secure Web Gateways (SWG) (13th), Cloud Access Security Brokers (CASB) (12th), Distributed Denial-of-Service (DDoS) Protection (7th), Software Defined WAN (SD-WAN) Solutions (12th), Access Management (11th), Bot Management (3rd), ZTNA as a Service (9th), ZTNA (4th), Secure Access Service Edge (SASE) (10th), Remote Browser Isolation (RBI) (3rd)
BigID Next
Ranking in Data Loss Prevention (DLP)
8th
Average Rating
8.2
Reviews Sentiment
7.0
Number of Reviews
15
Ranking in other categories
Data Governance (4th), Data Privacy Management Software (1st), Data Security Posture Management (DSPM) (4th), AI Data Analysis (3rd)
Forcepoint Risk Adaptive Pr...
Ranking in Data Loss Prevention (DLP)
44th
Average Rating
7.0
Reviews Sentiment
5.2
Number of Reviews
4
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of May 2026, in the Data Loss Prevention (DLP) category, the mindshare of Cloudflare One is 2.1%, up from 1.4% compared to the previous year. The mindshare of BigID Next is 2.7%, down from 4.4% compared to the previous year. The mindshare of Forcepoint Risk Adaptive Protection for DLP is 0.8%, up from 0.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Data Loss Prevention (DLP) Mindshare Distribution
ProductMindshare (%)
BigID Next2.7%
Cloudflare One2.1%
Forcepoint Risk Adaptive Protection for DLP0.8%
Other94.4%
Data Loss Prevention (DLP)
 

Featured Reviews

CV
Network Architect at IP Dimension
Cloud security has improved remote access and has reduced costs for smaller client sites
I have used Cloudflare One's Identity-Aware Proxy, and it is quite straightforward from what I have seen so far. The app registration on the Azure side integrates fully into Cloudflare, and I am very satisfied with that part because it is easy to set up. The integration of Cloudflare One's Secure Web Gateway and Zero Trust Network Access works without any issues. That part is pretty automatic, and if you complete the rest of the setup, it comes together by itself with no issues from my side. What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection. The hops get shorter and you get better latency. We have done testing to see if it is better. One thing that we did notice with our proof of concept with our current client is that they have people connecting from the UK. When they used their previous VPN solution, uploading CAD drawings and other files to the server took a long time. They mentioned that it is much quicker on Cloudflare One's solution. I definitely believe that is part of the improved performance, and I am satisfied with that as well. What is nice about Cloudflare One is that it makes the setup easier and also easier to train technicians to maintain it. Compared to legacy systems, we do not need to get fancy firewalls in place that are costly. That is definitely also a cost-saver with Cloudflare One.
Aniruddha Nath - PeerSpot reviewer
Senior Security Consultant at a consultancy with 10,001+ employees
Data discovery has transformed compliance workflows and automation now speeds up requests and remediation
The best feature that BigID offers is data discovery and classification, which is the most powerful engine. It allows connecting to many different data sources, ranging from cloud to on-premises to structured to unstructured data. If there is no connector available, you can build your own classifiers as well. Regarding the custom classifier option, you can build custom classifiers using regular expressions, and I have done that if you know how to create regular expressions. Custom connectors are something you create to connect to a database where the connector is not available. BigID has positively impacted my organization as it's a very powerful tool, especially with the increasing regulatory compliances for different countries such as GDPR, CCPA, and India's recent DPDPA act. Having these tools in place greatly helps organizations avoid any penal charges for not being compliant with the regulatory compliances. For example, regarding compliance or reduced risks for my clients, the DSAR process I was talking about allows organizations to respond quickly to user data deletion requests under GDPR law, which traditionally has a 30-day or 60-day timeline. In larger organizations, when the number of requests is high, it becomes tedious. However, using DSAR automation with BigID, it's almost instantaneous; instead of 30 days, you can respond in just one day to what users have requested.
SK
Cyber Security Engineer at Infratech Co
Policy management has improved data protection but configuration and encrypted traffic remain challenging
In my perspective, there are several things that need to be improved in Forcepoint Risk Adaptive Protection for DLP, such as the inability to monitor some encrypted data or data leaking in incognito mode. Additionally, Forcepoint Risk Adaptive Protection for DLP cannot monitor encrypted applications such as Microsoft Teams because it is end-to-end encrypted. In terms of additional features, there are many aspects of Forcepoint Risk Adaptive Protection for DLP that need improvement. Right now, two or three items are necessary, such as testing every policy to make sure they are configured correctly. We cannot go directly to production due to the extensive fine-tuning required, which typically takes two to three weeks to monitor the policy after customization. A lot of time has been consumed in the two to three weeks needed, which is something that should be reduced. Additionally, concerning the predefined policies, we cannot see the backend condition or backend script, which makes it difficult to modify the predefined policy.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Cloudflare Access is part of the Zero Trust philosophy."
"The solution has different options that can be used to differentiate DDoS attacks."
"It is a stable solution."
"It will take the blow rather than our applications should an attack occur."
"It's the endpoint exposition. We don't need to expose our VPN server to the internet and need a zero-test solution. I can apply some conditional access to the endpoint that's connecting to our network to check their security policies or the security condition of their workstation. Once the workstation is trying to connect to my internal network, then I would like to check the discrete condition of these endpoints that are trying to access my internal network. We created some conditional access. We have CrowdStrike, to check if the CrowdStrike is installed, to check if it's updated, and to check for Windows updates. We created some conditional policies to check it."
"Enables me to work from two locations."
"Cloudflare Access is a stable solution."
"Cloudflare is simple to use."
"Although I was serving the client rather than my own organization, BigID has made scans faster and more efficient, and the DSR results are much more accurate."
"The data classification offered by the tool can help companies improve their security strategy"
"The features that I have found most valuable are the user experience, the credentialing, and that BigID is user friendly. Additionally, you can deploy to several other Microsoft platforms and you can use it for other things, like a bigger element or a report."
"BigID is more advanced than Microsoft Purview when it comes to machine learning and AI development tools."
"My experience with BigID has been very positive and memorable, as BigID is simple, straightforward, and reliable when it comes to data discovery and data scanning exercises."
"Data classification is highly effective due to its automatic capabilities."
"The most valuable feature of BigID is its large number of classifiers, which allow us to scan for specific data such as SSN numbers."
"One of the most valuable things in a data-focused world is a tool, a technology that's data-centric, not trying to master data management or whatever else. It's a source of truth for what data an organization holds, giving it the ability to catalog, categorize, and understand its data."
"We chose Forcepoint as part of our cybersecurity strategy, and one of the key expectations was to prevent data leakage."
"It primarily influences policy enforcement, cloud application access control, and endpoint network coverage."
"The most valuable features in Forcepoint Risk Adaptive Protection for DLP include policy management and endpoint status, as well as supplementary servers, OCR, IRR, and additional features."
"Forcepoint Risk Adaptive Protection for DLP is purely a DLP-based solution, which makes it the best option available."
 

Cons

"Our subscription plan for the solution has a limitation of bot signatures."
"Cloudflare Zero Trust Platform needs to improve its documentation. It took time to do the implementation."
"They don't have a person to provide support for customers using the solution under their free plan."
"There are premium tier live service and lower tier live service, so we opted for the lower tier. But there is no medium tier where we pay a little extra and get a bit more service. So if that can be improved."
"The response time for support must be reduced."
"The tool should provide on-premise versions. Currently, all versions are cloud-based."
"Feedback could be enhanced. While I work efficiently with Clover as a partner in Mexico City, sometimes the information and requests are easier to manage with more concrete solutions."
"The initial onboarding was causing us some confusion."
"There are some shortcomings when it comes to Calvirus authentication, which is not yet supported by BigID."
"More classifications about different states are needed"
"One area where BigID can be improved is the UI, which has a lot of bugs."
"BigID is expensive. I prefer McAfee."
"BigID's user interface was problematic as it was not very user-friendly, though I believe it improved over time."
"I want them to focus on data mapping, assessment, automation workflow, and privacy incident management."
"I want them to focus on data mapping, assessment, automation workflow, and privacy incident management. The privacy tools have not been widely used, and they have not invested much in privacy code privacy tools."
"In terms of what could be improved, when you're looking in a BigID file, you cannot really get the whole file. You have to export it to download it to another platform that allows you to completely view it, or run a program. That was one of the things that was really a disappointing point for me. Not to be able to view everything. There's a lot more data, but you can't get it all at once."
"From an end user's perspective, it's not always clear what's happening with the DLP. It would be beneficial to have more use cases available, perhaps on a countrywide basis."
"The SaaS solution needs improvement, especially the malware-centric part, although the CASB is better but mostly data-centric. The after-sale support could also be improved."
"The deployment is a little bit difficult. It requires two to three separate servers for databases and the application."
"In my perspective, there are several things that need to be improved in Forcepoint Risk Adaptive Protection for DLP, such as the inability to monitor some encrypted data or data leaking in incognito mode."
 

Pricing and Cost Advice

"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"The prices are slightly expensive."
"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"The solution is not that expensive."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"The solution's pricing lacks transparency."
"Cloudflare Zero Trust Platform's pricing is good."
"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"I think that BigID's pricing is very reasonable."
"The solution is not licensed per user but rather based on capacity. For instance, organizations with large amounts of data, such as 50 GB or more, are the ones that typically qualify for BigID."
"The product is expensive, but so are all competitor tools"
"The pricing depends. If you have thousands of data sources to connect and manage, and you struggled with an MDM package in the past, you'll find BigID valuable and even cheap. But if you're a small business, it's probably not the right tool for you."
"The solution is expensive."
"The licensing cost is roughly 90 US dollars per year, per license."
report
Use our free recommendation engine to learn which Data Loss Prevention (DLP) solutions are best for your needs.
894,738 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
20%
Comms Service Provider
11%
Financial Services Firm
9%
Manufacturing Company
6%
Financial Services Firm
20%
Manufacturing Company
8%
Insurance Company
8%
Comms Service Provider
6%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise1
Large Enterprise12
By reviewers
Company SizeCount
Small Business5
Large Enterprise11
No data available
 

Questions from the Community

What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
What is your primary use case for Cloudflare Access?
Cloudflare Access provides secure access to internal applications for employees, external members of the organization...
What advice do you have for others considering Cloudflare Access?
Cloudflare Access is one of the best integrations available. While about two hundred vendors offer similar services, ...
What do you like most about BigID?
I like BigID's in-depth discovery and scanning capabilities, especially for unstructured data. This feature is a stan...
What needs improvement with BigID?
One improvement I would suggest is addressing the intermittent failures of BigID scans, as there are times when some ...
What is your primary use case for BigID?
BigID's main use case is connecting to various data sources to perform the data discovery process, classify the data ...
What is your experience regarding pricing and costs for Forcepoint Risk Adaptive Protection for DLP?
Forcepoint Risk Adaptive Protection for DLP is very costly, especially in Sri Lanka, but the compliance ROI justifies...
What needs improvement with Forcepoint Risk Adaptive Protection for DLP?
In my perspective, there are several things that need to be improved in Forcepoint Risk Adaptive Protection for DLP, ...
What is your primary use case for Forcepoint Risk Adaptive Protection for DLP?
I have experience with Forcepoint Data Loss Prevention and Netwrix Endpoint Protector, as I am currently working with...
 

Also Known As

Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
No data available
No data available
 

Overview

 

Sample Customers

23andMe
Home Depot, Grant Thornton LLP, Cimpress, Fidelity Investments
Information Not Available
Find out what your peers are saying about BigID Next vs. Forcepoint Risk Adaptive Protection for DLP and other solutions. Updated: April 2026.
894,738 professionals have used our research since 2012.