We compared Netskope and Forcepoint ONE based on our users' reviews across four parameters. After reading all of the collected data, you can find our conclusion below.
Netskope offers comprehensive data protection, advanced threat protection, advanced analytics, and granular policy enforcement. Users appreciate the competitive pricing, positive return on investment, and excellent customer service. Forcepoint ONE is highly regarded for robust security measures, intuitive interface, seamless integration, and data protection. Users praise the pricing, setup cost, licensing, and customer service of Forcepoint ONE.
Features: Netskope offers valuable features such as comprehensive data protection capabilities, advanced threat protection, advanced analytics, and granular policy enforcement. Forcepoint ONE is highly regarded for its robust security measures, intuitive user interface, seamless integration capabilities, and advanced data protection features.
Pricing and ROI: Netskope offers competitive pricing and a straightforward setup process with reasonable licensing terms. Forcepoint ONE also offers competitive pricing and a reasonable setup cost, with a straightforward and hassle-free licensing process. Netskope is praised for delivering increased security and data protection, enhanced visibility and control over cloud services, efficient threat detection, seamless integration, and overall cost savings. Forcepoint ONE's impact on ROI is not explicitly mentioned by users.
Room for Improvement: Netskope users have expressed the need for a more intuitive interface, better customer support, improved performance during high-traffic periods, and more comprehensive reporting. Forcepoint ONE users want a more intuitive UI, better documentation and training resources, improved speed and performance, and enhanced customization options.
Deployment and customer support: The initial setup phase of Netskope is easy, with some users mentioning that it can be completed in a matter of weeks or even a couple of days. Deployment on the cloud is quick, however, the implementation phase is more complex. The initial setup of Forcepoint ONE is straightforward. Users receive a master administrator login and can onboard more addresses. Netskope users are satisfied with the company's customer service, praising their responsiveness and knowledgeable assistance. Forcepoint ONE customers also appreciate their professional and attentive support, describing it as reliable and top-notch.
The summary above is based on 16 interviews we conducted with Netskope and Forcepoint ONE users. To access the review's full transcripts, download our report.
"The solution is stable."
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"Forcepoint ONE is okay for me, and I find it a very good solution. Its most valuable feature is monitoring. Its monitoring is very good, and it can communicate with a SIEM system. I also find the DLP feature of Forcepoint ONE good."
"The initial setup was straightforward, which was a huge win. That mostly goes to the fact that they are agentless. We didn't have to sit there deploying thousands of agents and all the things that go along with that type of deployment. We were up and running very quickly."
"The core CASB solution is the most valuable part. It allows us to put policies in place around which devices can log into our cloud applications. We have a policy that states that only company devices can access these cloud applications."
"By default without a policy, Bitglass has the capability to notify the admin of multiple or simultaneous logins across a wide range of geographical regions."
"We are able to verify what is getting saved out onto the cloud. It allows us to have some DLP rules, since we have to be HIPAA compliant. If some personal health information has been uploaded to Office 365, then we are able to detect that sort of thing and account for it. We have set up rules to prevent people from doing that."
"The solution’s AJAX-VM provides constant reverse proxy uptime. It has been very positive for our security operations. When people are trying to access the SaaS solution, it protects us from downloading any of that data and experiencing any type of attacks"
"The solution is very good when it comes to securing us against data leakage, because of the other proxy. It also has API scanning or data at rest. It inspects data in motion, which is the proxy, and then it has the data at rest, which is the API scanning. We can inspect for anything we want: file fingerprinting, PHI-sensitive data, PCI-sensitive data. It does not matter. We can usually find it and block it in transit and do our remediation with it. It could either be block, encrypt, or allow and watermark the file to follow it and see where it goes. It allows for those different scenarios."
"The biggest thing that I like about this product is that it's easy to use and teach. When we have somebody new starting to work with the product, it's easy to teach them. It's also easy to use the product as it does so much."
"In Azure, we have multiple subscriptions and with every subscription, we add some kind of instance ID. We can work with the instance ID so that we allow all of the instances containing nodules. Everything else, we block. This way, if you go to outlook.com and check your email, if you log in with your company account, the instance ID will show. The network will take action according to the instance ID and say, "You are using the enterprise email. I'll let you surf. I'll let you see your email." But when you try to log in with your own email address, like Hotmail or Gmail, the instance ID will be different. This way we are not completely blocking Outlook, but we are blocking people from accessing their Outlook. We are only allowing the enterprise-level emails, and we are not allowing user-based emails."
"The solution offers a better understanding of the real scenario and identifies the cloud apps that are being utilized."
"It has hundreds of features and many of them are useful."
"I have found the most useful features to be the Web Secure Gateway, CASB, infrastructural service scanning, and Zero Trust."
"The automation offered by the product is pretty solid."
"It is a very scalable tool."
"The client size and architectural components in Netskope are far better than other solutions."
"A feature that was valuable was the built-in website classification or safety ratings. Different websites would be rated according to analyses that the Netskope team had done, and we built policies on some of those scores. If the website scored less than a certain percentage, then we would have a different user experience around how the site would interact with the clients."
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"In our environment, when an Active Directory password changes, we tend to have some latency issues with access. It takes about 15 minutes before that password is accessible through Bitglass after the change. That would be the major thing I see as a negative."
"We encounter challenges in determining whether certain features for blocking certain file types or preventing automatic downloads are functioning correctly."
"Initially, we had some challenges that Bitglass resolved quickly. The challenges were around communication. There didn't seem like there was the right level of communication within the Bitglass organization. Once we brought the issues up at a higher level, then they were resolved."
"Bitglass integration with some IDP providers needs improvement."
"One area for improvement in Forcepoint ONE is that you'll need more training to install the solution yourself. I practiced in a laboratory and I needed more technical information to do the installation."
"Their new SASE (secure access service edge) product would have been the one thing I would have requested. Now that they have that platform, I'd like to see it as integrated and seamless as possible with the core product. That's what they're working towards and that's where we're seeing the advancements."
"Integration into different multi-factor authentication tools. On their page, they tout Duo, but I don't use Duo. I use another vendor. Not that they don't interact, but it takes a little bit more doing. Any amount of efficiencies here would help."
"I wish they would advance more into the endpoint DLP solution. Currently they do not do anything around endpoint, they're still strictly cloud-based. The forward proxy is really the only thing they do. What I would like to see them do is to scan machines, workstations and servers, for information we might not want on those machines. That would be huge."
"Third party integration with other cloud applications could be improved. Sometimes the API won't be working, but Netskope is taking it seriously. They accept all the feature requests, and they are trying to provide whatever we ask from them."
"I deduced two points: one for their feature modification and one for the feature maturity of the solution."
"If we need to allow a process that is blocked by Netskope, we have to manually check the logs to see why it is blocked. This can be time-consuming and inefficient"
"They could improve their mobile agents as they have some limitations."
"Compatibility with other proxy polars would be helpful."
"There could be better integration with other solutions."
"They can focus more on ease of admin, ease of use, and ease of migration. Migration should be simple for companies that are using a different platform and would like to move to Netskope. Everyone looks for a simple migration. They can also focus more on cloud services and cloud trends. They have to see the cloud market, and they should try to compete with Zscaler and other players. They should also work on licensing costs."
"The CSPM model needs to improve."
Forcepoint ONE is ranked 8th in Cloud Access Security Brokers (CASB) with 10 reviews while Netskope is ranked 4th in Cloud Access Security Brokers (CASB) with 35 reviews. Forcepoint ONE is rated 8.4, while Netskope is rated 8.4. The top reviewer of Forcepoint ONE writes "Gives us another layer of protection when it comes to end users; an extra set of eyes and ears". On the other hand, the top reviewer of Netskope writes "Network proxy that provides visibility during deployment and allows you to control PII". Forcepoint ONE is most compared with Microsoft Defender for Cloud Apps, Prisma Access by Palo Alto Networks, Forcepoint Secure Web Gateway, Cisco ISE (Identity Services Engine) and Zscaler Internet Access, whereas Netskope is most compared with Zscaler Internet Access, Prisma Access by Palo Alto Networks, Microsoft Defender for Cloud Apps, Cisco Umbrella and Axis Security. See our Forcepoint ONE vs. Netskope report.
See our list of best Cloud Access Security Brokers (CASB) vendors and best Secure Access Service Edge (SASE) vendors.
We monitor all Cloud Access Security Brokers (CASB) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Hi Tim, I'm currently a student and doing research about cyber security market, may I know how do you narrow your list down to these 5 vendors?
Hi, I am working on both Skyhigh and Netskope. The both has their own unique features. List down your requirement and do the POC with the said products.
Skyhigh is efficiently handling both shadow IT and sanctioned IT applications. DLP, threat protection and access controls are the key features of skyhigh.
Netskope is good in access control.
Regards / Ramesh M
Hello,
The CASB space is booming right now. Everyone is leveraging the cloud for various reasons and having a CASB in place is paramount to security. What CASB to get is really a matter of your business requirements. What exactly are you trying to do? Do you want to get a handle on all the Shadow IT that your company is currently exposed to and set up a plan for such activity? Do you want to apply DLP policies to safeguard your data? Perhaps GDPR and other regulatory issues are forcing you to get into compliance? There are many reasons for adopting a CASB solution, the best place to start is with an Audit of your current traffic and finding out what Shadow IT is present, any related Shadow Data that needs to be monitored, and come up with a plan on how to handle SaaS apps in the cloud. The best CASB vendors out there will offer the audit service as part of the CASB solution. From there, you can design policy and stipulate what cloud apps to sanction, which ones to block, and how to coach users during any suspect activity. The end goal is to keep your users productive and happy while securing your data in cloud apps.
For an unbiased answer, I would direct you to Gartner and Forrester for reports on CASB. They will detail what the landscape looks like, who the vendors are, what the pillars of a good CASB solution should entail, as well as some features and functionality that are specific to the various CASB vendors. Gartner has a CASB overview document that is very handy and they are currently working on a magic quadrant for the existing vendors. Forrester has released a “ForresterWaveCASB” document that dives into the vendors and who they think are the best based on market presence, features, etc.
Of course, Symantec offers a CASB solution that should be added to your list of vendors for review. Do not look at a CASB vendor without looking at Symantec. Currently, Forrester ranks Symantec as the number 1 CASB vendor in the marketplace. Symantec offers the following:
· Cloud app discovery and analysis
· Data governance and protection
· Threat detection and incident response
· A CASB that integrates with Symantec DLP (the industry’s leading DLP solution)
· Integration with endpoint
· Integration with Secure Web Gateway (Blue Coat proxies are the best in the industry)
· Authentication with Symantec VIP
· Field level tokenization and encryption
· File-level encryption
Consider these questions when looking for a CASB vendor:
· What do yo udo when you need to apply consistent DLP policies to data in the cloud and on premise?
· What are your options for encrypting confidential data
· Can you safeguard against confidential data transfer to unsanctioned cloud apps or personal cloud accounts?
· Can the CASB automatically identify and respond when a user account has been compromised?
· Does the CASB automatically classify confidential data or do you have to build a system from scratch?
Netskope is really good. MCAS meets the requirements but lacking features, it is cheaper though. Depends on your requirements, netskope has an optional light weight desktop agent which makes monitoring easy.
Do you have any specific requirements?
we use ciphercloud. basically, all of them handles: office, google, & salesforce. now with the GDPR happening in our european offices they're mainly SAP & ciphercloud is the only one approved by SAP.
At the risk of giving a solution without knowing the situation, some very broadbrush advice would be to look at these vendors in this priority order. That said, given the right environment, any of them could be the best fit. CASB is not a market that is matured with standard architectures and features, so it is advisable to consider the specific requirements before making a decision. Another way to say this is there is not one that is universally superior in most situation.
1. Netskope
2. Skyhigh
3. CipherCloud
4. Bitglass
5. Microsoft Cloud App Security
The ones higher on this list tend to have a greater number of use cases where they do a good job. I don’t feel I can publish pros and cons in this forum.
We have used Skyhigh and its pretty good to handle cloud sanctioned IT applications like Office365, Google APPs and salesforce etc.
Easy to deploy, better application, device and user visibility.
No help on any of these, but thanks for the question. For a holistic approach (because anything less is insufficient), I've begun using Sophos appliances, services, and endpoint protection which all speak with each other and really fortify a network on all fronts. Services take up resources, so be sure to invest in an appliance powerful enough to serve all your endpoints effectively. Hope this helps.