


Find out what your peers are saying about Proofpoint, Microsoft, Check Point Software Technologies and others in Email Security.
| Product | Mindshare (%) |
|---|---|
| Cisco Secure Email | 5.2% |
| Microsoft Defender for Office 365 | 8.8% |
| Proofpoint Email Protection | 8.1% |
| Other | 77.9% |
| Product | Mindshare (%) |
|---|---|
| Forcepoint Secure Web Gateway | 3.1% |
| Cisco Umbrella | 12.8% |
| Zscaler Internet Access | 12.1% |
| Other | 72.0% |
| Company Size | Count |
|---|---|
| Small Business | 10 |
| Midsize Enterprise | 2 |
| Large Enterprise | 11 |
| Company Size | Count |
|---|---|
| Small Business | 22 |
| Midsize Enterprise | 18 |
| Large Enterprise | 26 |
| Company Size | Count |
|---|---|
| Small Business | 23 |
| Midsize Enterprise | 6 |
| Large Enterprise | 29 |
Cloudflare One is a comprehensive platform for security, performance, and connectivity. It provides features like rate limiting, DDoS protection, and application access, tailored to enhance user experience while securing internet access and accelerating communications.
Designed to integrate security measures with ease of use and scalability, Cloudflare One offers a secure web gateway and zero trust network access. These features ensure seamless setup and operation, making connectivity reliable and protected. Users appreciate its integrated console, intuitive interface, and the ability to manage risk effectively. It offers straightforward deployment, improves latency, and boasts cost-effectiveness. While its onboarding process and documentation need enhancement, its value in content delivery and application shielding is notable. Despite challenges in integrating Cloudflare Access with existing VPNs and the need for better automation and support, it remains vital for DNS and infrastructure protection.
What features make Cloudflare One stand out?In industries like finance, retail, and technology, Cloudflare One is crucial for enabling secure remote access and protecting web applications against dynamic threats. It supports compliance access policies and enhances content delivery, playing a key role in safeguarding digital infrastructure.
Cisco Secure Email provides email security with advanced threat protection, spam filtering, and easy integration with Cisco Talos, ensuring comprehensive protection against cyber threats like phishing and malware.
Cisco Secure Email offers a comprehensive platform for organizations seeking robust email security. With advanced threat protection and seamless integration with Cisco Talos, it enhances threat intelligence. The tool provides easy-to-use spam blocking and granular policy customization. Effective ransomware, phishing, and malware protection ensures stable network performance. It includes logging and reporting features, along with Active Directory integration, delivering enhanced security without extra hardware. Although it addresses threats efficiently, improvements in synchronization with reporting tools and phishing detection are needed. Organizations find cost and licensing complexities challenging for smaller networks and seek more intuitive configuration, advanced AI threat detection, and comprehensive reporting. Enhanced support, documentation, and cross-platform compatibility are desirable for better management and scalability.
What are the most important features?In industries like finance, healthcare, and IT, Cisco Secure Email is key to securing email communications. It serves as the primary email gateway in datacenters, scanning and filtering emails to defend against phishing, malware, and spam. Many organizations integrate it with Sophos Antivirus and Talos Threat Intelligence for heightened protection. It plays a crucial role in outbound message control and data loss prevention, ensuring compliance with security policies.
Forcepoint Secure Web Gateway is a secure web gateway (SWG) tool that provides multiple forms of protection against malware, including blocking categories of websites, inline scanning of downloaded files, and zero trust-based advanced threat protection. The solution monitors and controls any interaction with any website, including blocking access to websites based on category and risk score, blocking download of malware, blocking upload of sensitive data to personal file sharing accounts, and detecting shadow IT.
Forcepoint Secure Web Gateway Features
Forcepoint Secure Web Gateway has many valuable key features. Some of the most useful ones include:
Forcepoint Secure Web Gateway Benefits
There are many benefits to implementing Forcepoint Secure Web Gateway. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Forcepoint Secure Web Gateway is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it has strong reporting capabilities, good URL filtering, and can retrieve and analyze lost data when necessary.
Shipra G., Service Delivery Manager at Paramount Computer Systems, says, “The reporting part of it is pretty awesome. With the reporting, you can drill down effectively. It gives us a lot of power to really look into what we are looking for. That is one very crucial feature. In the remote filtering part, the agent that they have on Forcepoint is pretty light. That also is a very, very good feature that we look into and sell.”
Mohammed S., Security Engineer at Futuretec, writes, "The most valuable feature for me in Forcepoint Secure Web Gateway is URL filtering, though all other features of the product are okay as well."
Arvind K., Director at Foresight Software Solutions Pvt Ltd., says, “They have well-integrated web security. They have the enterprise DLP included in the cloud as well.”
An Ict Help Desk Administrator Individual Contributor at a transportation company states, “The most valuable feature of Forcepoint Secure Web Gateway is the ability to retrieve and analyze lost data. It also allows us to detect and prevent the release of all messages and to take appropriate actions in consequence.”
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.