


Find out what your peers are saying about Cisco, Fortinet, Zscaler and others in Secure Web Gateways (SWG).
With iboss, whenever you turn on your laptop, the iboss agent automatically connects to the iboss cloud, enforcing all security policies. So with respect to the security side, it strengthens measures.
I have seen some cost effectiveness from iboss; it has reduced certain support requirements, making it a more hands-off solution.
I have fewer employees because Forcepoint ONE does the work that I used to rely on a team of engineers to previously detect.
Since I'm on the technical side, I don't handle ROI or financial metrics directly, but based on client feedback, many have seen improvements in operational efficiency mainly through centralized policy management and reduced manual investigation time, resulting in time savings and better visibility across their environments.
It is very difficult to measure the return on investment, but the control for the data is very important for companies because without an application similar to Forcepoint ONE, there is no control.
They know how much money they are losing while the system is down, so by increasing the possibility of not having a down website or web application, return on investment can be calculated easily.
I was able to save over seven million dollars last year as return on investment in the company.
I have seen a return on investment with Imperva Application Security Platform, as it is generally associated with time savings, because the review of alerts and the visibility it gives saves us significant operational time.
They are very fast, responsive, and knowledgeable.
The quality of the support is fantastic.
We had promising discussions about resolving these issues, but no real action followed.
Having a local principal support available also helps speed up communication and coordination, especially for urgent or region-specific cases.
An engineer comes to resolve the issue.
They are responsive and assist me with creating cases for any complex issues.
I would rate the technical support of Imperva DDoS as ten.
They need to work faster on the response time because of issues of urgent replies.
Responsive support addressing urgent needs.
They are also able to meet on-demand requirements based on your contract with them, and can easily provide adequate resources and scalability.
I would rate it a nine out of ten for scalability.
If I start seeing sluggishness or anything like that, I just reach out to my rep, and they connect with their dev team, typically resolving it the same day.
It can easily scale to support thousands of users and devices without requiring major infrastructure changes.
Forcepoint ONE runs smoothly, and scaling is easy.
Forcepoint ONE is very scalable because it is located in the cloud, and I don't have to manage the machines or anything with the infrastructure.
99% of customers are using the cloud version of Imperva DDoS protection, so they just purchase the new license and scale as needed.
I have not even needed support after deployment, since it has remained stable.
It is easy to always scale to add more users.
It's been pretty solid; I've never had an outage with them, and if I ever had, it's only been once out of the seven years.
We've experienced zero downtime.
Our biggest problem with their service was it did not recognize the device despite our ClearPass sending information to the iboss box.
Forcepoint ONE is very stable.
There have been some specific outcomes since switching to Forcepoint ONE.
I think Forcepoint ONE is pretty stable, as the connection and agent synchronization are reliable, but it can still be improved.
It is also a stable product without much glitch or downtime.
One notable drawback is that, unlike Fortinet, which offers fast track labs and continuous enablement, Imperva Application Security Platform lacks lab access and fast track labs for enablement and product advertising.
The stability of Imperva DDoS is very good, as it seems they have a lot of servers around the world.
It is not as intuitive as the rest of the platform.
We also had a problem with a transition when we upgraded from one appliance of theirs to another, but their engineer lost a good deal of our data.
Our iboss subscription access should be more secure with an OTP or VPN etc.
I need to control specific functionalities within certain applications, like preventing the transfer of certain file types.
Having more flexible reporting and alert customization to tailor insights for different clients and compliance needs would be beneficial.
There is room for improvement in making the reporting closer to real-time, ideally around five or ten minutes instead of half an hour.
To convince my clients, a purely on-prem solution would be ideal since they are financial institutions.
Maybe Imperva DDoS could use endpoints to get information about the attacks before they commence from the endpoint level or establish cooperation with endpoint vendors to share this information.
Regarding return on investment, ROI, I can say it is noticeable with Imperva Application Security Platform.
It offers the same features you would get from a vendor that charges 250,000 British pounds for a fraction of the price.
The following year, the cost of just licensing was similar to what was paid the previous year for a new appliance along with the implementation and licensing costs.
Regarding pricing, setup costs, and licensing, iboss is not cheap, and that's my only concern.
The pricing is very good and cheaper than other solutions like Netskope and Forcepoint.
the pricing is better than all
The licensing and pricing were fine with no issues.
I would rate the pricing of Imperva DDoS as five, where one is very cheap and ten is very expensive.
the setup cost was high, with the hardware installation in the data center being particularly expensive.
We have noticed faster response times and fewer security alerts because after doing some custom policy tuning, everything seemed to be aligned and we have fewer attacks to monitor and fewer alerts to monitor.
The solution's mental health function can detect if someone needs help.
It's given us a lot more visibility into our computer assets that may be infected with viruses and also shows us people who have unusually large uploads or might be engaging in high-risk activities, such as searches or going to sites not categorized by their web crawler.
iboss was the best solution for us because, no matter what domain you were in, everything is under a single pane of glass, which is exactly what we wanted.
The most valuable feature was the website blocking capability, which allowed me to quickly block any dodgy websites.
It shortens response time for our clients, allowing their security team to view incidents in real-time, classify them easily, and focus on genuine risks instead of sorting through false positives, and it simplifies reporting and audit preparation since all the relevant data is consolidated in one place.
Forcepoint ONE made a difference, particularly regarding cost reduction because all the features that Forcepoint ONE bundles are in one package.
The API security feature is particularly valuable because most attackers do not try to come in from where it is expected.
If someone attempts to access the server, the WAF blocks that SSRF alert, or RCE, Remote Code Execution alert, blocking immediately based on the signature, not only by the payload or the IP address.
It reduces the DDoS attacks and reduces the attacks from threat actors, including SQL Injection and zero-day attacks, by using dynamic application profiling from Imperva.
| Product | Mindshare (%) |
|---|---|
| Forcepoint ONE | 1.6% |
| Zscaler Internet Access | 10.3% |
| Cisco Umbrella | 10.2% |
| Other | 77.9% |
| Product | Mindshare (%) |
|---|---|
| Imperva Application Security Platform | 8.5% |
| Cloudflare | 14.0% |
| Arbor DDoS | 7.2% |
| Other | 70.3% |

| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 7 |
| Large Enterprise | 8 |
| Company Size | Count |
|---|---|
| Small Business | 10 |
| Midsize Enterprise | 3 |
| Large Enterprise | 12 |
| Company Size | Count |
|---|---|
| Small Business | 88 |
| Midsize Enterprise | 25 |
| Large Enterprise | 69 |
Iboss offers a comprehensive cloud-based security platform valued for its scalability and autonomous features, ensuring robust security with easy deployment and management capabilities.
Renowned for its robust security architecture, Iboss integrates seamlessly within diverse networks, delivering efficient granular filtering and advanced content categorization. Its single pane of glass console provides ease of management, allowing rapid scalability suitable for rapidly deploying environments. Operates in BYOD setups due to inline filtering without device installation. Integration with cloud-based applications enhances user control, and features like SASE, SSL inspection, and ChatGPT risk protection stand as highlights. Despite its strengths, users have pointed out areas for enhancement like direct navigation in reports, SSL decryption, and better cloud integration while having room to improve data loss prevention.
What are the most important features of Iboss?The usage of Iboss spans educational institutions, specifically K-12, to enforce internet policies, protect data, and support remote work environments. It provides web filtering and security frameworks to ensure safe browsing. Its platform-as-a-service model offers flexibility for both cloud-based and on-premises requirements, integrating seamlessly to deliver enhanced security features suitable for various deployment needs including zero trust, CASB, and network security for work-from-home setups.
Forcepoint ONE offers a comprehensive solution for data protection and security compliance, focusing on cloud applications and role-based access control for safe interactions across platforms.
Forcepoint ONE effectively manages data access, ensuring security and compliance while reducing operational costs and offering a user-friendly interface for easy management. Integrating seamlessly with existing company devices, it provides enhanced Zero Trust Network Access, incident management, and identity verification. Cloud application protection, including Office 365, is maximized through strategic use of Secure Web Gateway (SWG) and Cloud Access Security Broker (CASB) models, which help guard against unauthorized access, manage secure logins, and filter URL content.
What are the key features of Forcepoint ONE?Organizations use Forcepoint ONE primarily for ensuring compliance and secure data management in environments like healthcare and corporate sectors. By safeguarding sensitive information like PHI and utilizing robust role-based access control, users can enhance security measures significantly. Additionally, the system's ability to manage secure exchanges and protect resources underlines its relevance in regulated industries.
Imperva Application Security Platform delivers comprehensive and continuous web threat protection. Renowned for its ease of use, it shields web applications and databases from various cyber threats while integrating seamlessly with cloud and on-premises environments.
Imperva Application Security Platform protects web environments by offering advanced security measures against threats like DDoS attacks, SQL injections, and cross-site scripting. As a robust web application firewall, it provides extensive monitoring and bot management capabilities. The platform integrates content delivery networks for enhanced performance and scalability, while real-time traffic analysis ensures consistent protection. Despite its strengths, improvements can be made in policy management and customization options. Users seek better integration with third-party tools and more competitive pricing models. The inclusion of AI for enhanced analytics is also anticipated.
What are the key features of Imperva Application Security Platform?Imperva Application Security Platform is implemented in industries needing strong database and application protection. Companies use it to enforce geolocation restrictions and manage bots, benefiting sectors like finance and e-commerce where data security and threat monitoring are critical. Its ability to protect and ensure data accessibility makes it integral to business operations prioritizing cyber resilience.
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.