What is our primary use case?
We use the solution as an overall proxy. We are using Forcepoint Web Gateway to allow only trusted, valid URLs - whatever is accepted or offered by the cache rate.
It's a landing zone for all kinds of end-user traffic for the internal users, as well as to protect against any attacks from my external users. Also, it controls the internal IT assets and can protect us from hard, new, cyber attacks, ransomware, and other things. That's how it has been used right now specifically.
What is most valuable?
The agent is acting as a HIPS, host intrusion prevention system, apart from providing trusted access to any external websites. It is doing some real-time monitoring, as well as reporting security events. It can able to give an alert for any security event, which is any unauthorized event. It sends a notification to the reporting manager, who can be immediately alerted. It can happen in nearly real-time. The reporting is very helpful.
There is some sandboxing available, which is quite useful.
The solution is scalable.
It's fairly easy to set up if you have some prior knowledge.
The stability is good.
It offers reasonable pricing.
What needs improvement?
The Sandbox solution should be integrated with the NIST to handle whatever new vulnerabilities or new sites are identified as potential threats. That could be dynamically integrated and implemented in a production enrollment, just like intelligence threat production. That would help in an intruder use case.
For how long have I used the solution?
We've been using the solution for three or more years.
What do I think about the stability of the solution?
The stability is okay. The performance is also very good. The threat handling is almost near real-time, and even notifications and reporting happen fast so that we can take corrective actions. Overall, the experience was good. There are no bugs or glitches. It doesn't crash or freeze.
What do I think about the scalability of the solution?
In our organization, we have 35,000 people.
It is very scalable. We haven't had any issues with the process.
How are customer service and support?
I don't deal with technical support directly. However, we haven't had any major issues and likely have not needed much support in general.
Which solution did I use previously and why did I switch?
We are using multiple products. For an antivirus, we are using Symantec solution as well as Trend Micro. For our deep security, we are using IBM Deep Security. For our SIM product, we are using IBM Suite, as well as, for all other things, Cell Core for data DLP and DLK solutions. Predominantly, that's it. We are also using Forcepoint and a few other cloud-based web solutions.
However, we used something called CrowdStrike only as a validation solution for a very short period. Then immediately, we started migrating to Forcepoint.
CrowdStrike predominantly behaves like a sensor; it's not giving all the features of a proper web application firewall. We have to configure a bunch of things as a part of the CrowdStrike.
How was the initial setup?
If a person understands all the important tools and how they can be integrated with all other security products, it's easier to set up. It's a little bit of a challenge for any new person. There should be a blueprint or a condensing intro matrix. The Secure Web Gateway must be integrated with multiple other security products within the enterprise. There needs to be a compatibility matrix, like how this virtual VDA enrollment and other solutions. Nowadays, VDA enrollment is also coming as a hosted solution in the cloud and virtual software enrollments. It can be either on Azure, AWS, or some other third-party tools, probably that's like VMware Horizon, or it may be coming from Nutanix Frame. There are so many integration complexities in a large enterprise. If there's a blueprint, automation, or workflow, it improves the early adoption of these tools and provides a better onboarding experience.
Most of the deployments we manage through the deployment tools collected, either via IBM patch management solutions, or some automation tools, like Python. Using these agents helps with the rollout.
Initially, we took a week to ten days to deploy the product. However, rolling out the agents now, the agents are adding automated tools. For the initial implementation in our organization, we had more than 2,000 finder servers, plus other NTPs, which is why it took almost ten days.
I'd rate the overall process a four out of five in terms of ease of deployment.
Following deployment, the maintenance is minimal. It's on the cloud and we have a subscription, so there isn't much to manage.
What's my experience with pricing, setup cost, and licensing?
While I'm not directly handling the licensing and payments, my understanding is the solution is competitively priced.
What other advice do I have?
We're internally using the product. I'm not sure which version of the solution we're using. IT and security mostly deal with the product and any updates.
Potential new users will find it easy to adopt this solution. Most policies can be leveraged from other deployments, and you can confidently run them.
I'd recommend the solution to other users and companies.
I would rate the product nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner