


Symantec Proxy and Forcepoint ONE compete in the security domain, particularly in web security and data protection. Forcepoint ONE appears to have an upper hand due to its comprehensive feature set, offering greater overall value.
Features: Symantec Proxy offers granular web traffic control, advanced threat protection, and a reliable Global Intelligence Network. Forcepoint ONE provides integrated cloud security, Zero Trust Network Access, and robust remote user protection.
Room for Improvement: Symantec Proxy could enhance its deployment complexity, improve cloud features, and refine user interface intuitiveness. Forcepoint ONE might strengthen its data at rest capabilities, better integrate third-party solutions, and simplify user management features.
Ease of Deployment and Customer Service: Forcepoint ONE is noted for a streamlined deployment process and proactive customer support, ideal for quick setup. Symantec Proxy requires a more complex deployment, potentially increasing resource use and time.
Pricing and ROI: Symantec Proxy offers affordable setup with solid ROI primarily due to effective web security solutions. Forcepoint ONE, despite a higher initial investment, provides extensive features leading to potentially greater long-term ROI.
| Product | Market Share (%) |
|---|---|
| iboss | 2.4% |
| Forcepoint ONE | 1.5% |
| Symantec Proxy | 2.0% |
| Other | 94.1% |
| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 6 |
| Large Enterprise | 5 |
| Company Size | Count |
|---|---|
| Small Business | 10 |
| Midsize Enterprise | 3 |
| Large Enterprise | 12 |
| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 4 |
| Large Enterprise | 12 |
Iboss offers a comprehensive cloud-based security platform valued for its scalability and autonomous features, ensuring robust security with easy deployment and management capabilities.
Renowned for its robust security architecture, Iboss integrates seamlessly within diverse networks, delivering efficient granular filtering and advanced content categorization. Its single pane of glass console provides ease of management, allowing rapid scalability suitable for rapidly deploying environments. Operates in BYOD setups due to inline filtering without device installation. Integration with cloud-based applications enhances user control, and features like SASE, SSL inspection, and ChatGPT risk protection stand as highlights. Despite its strengths, users have pointed out areas for enhancement like direct navigation in reports, SSL decryption, and better cloud integration while having room to improve data loss prevention.
What are the most important features of Iboss?The usage of Iboss spans educational institutions, specifically K-12, to enforce internet policies, protect data, and support remote work environments. It provides web filtering and security frameworks to ensure safe browsing. Its platform-as-a-service model offers flexibility for both cloud-based and on-premises requirements, integrating seamlessly to deliver enhanced security features suitable for various deployment needs including zero trust, CASB, and network security for work-from-home setups.
Forcepoint ONE is a comprehensive cybersecurity platform that provides organizations with a unified approach to protecting their critical data and assets. It offers a range of solutions that cover everything from network security and cloud security to data protection and insider threat prevention.
With Forcepoint ONE, organizations can gain complete visibility into their security posture, identify potential threats, and take proactive measures to mitigate risks.
One of the key features of Forcepoint ONE is its ability to provide real-time visibility into user behavior across all endpoints, networks, and cloud environments. This allows organizations to quickly identify and respond to potential threats, such as insider threats or malicious activity from external actors. Additionally, Forcepoint ONE offers advanced threat intelligence capabilities that leverage machine learning and AI to detect and respond to emerging threats. Another important aspect of Forcepoint ONE is its data protection capabilities.
The platform offers a range of solutions for protecting sensitive data, including data loss prevention (DLP), encryption, and secure web gateways. These solutions help organizations ensure that their critical data is protected both at rest and in transit, regardless of where it is stored or accessed.
Forcepoint ONE is a powerful cybersecurity platform that offers a comprehensive set of solutions for protecting organizations against a wide range of threats. With its advanced threat intelligence capabilities, real-time visibility into user behavior, and robust data protection features, Forcepoint ONE is an ideal choice for organizations looking to take a proactive approach to cybersecurity.
Symantec Proxy is designed to provide web security, web access control, and secure web gateway functionalities for organizations. It helps protect against web-based threats, enforce web usage policies, and provide secure access to internet resources.
Symantec Proxy Benefits:
Symantec Proxy Features:
Reviews from Real Users
Below are some reviews and helpful feedback written by Symantec Proxy users.
PeerSpot user, Consultant at a financial services firm, says that Symantec Proxy "...enables us to manage bandwidth for users based on their privilege levels. For example, if a user wants to use a certain application or resource, we can provide access based on their privileges."
PeerSpot user, General Manager & founder at a engineering company, writes that Symantec Proxy has "A complex deployment, no proper user reporting, and a proxy component that works."
Muhammad Salahuddin, Unit Head - Network and Security Solutions at FPM Solutions, states that Symantec Proxy has "Good URL filtering but is expensive and doesn't have good technical support services."
We monitor all Secure Web Gateways (SWG) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.