Forcepoint CASB ensures that access to cloud applications is properly vetted and monitored. We have a lot of remote and field workers, and many staff members are not required to come into the office. We needed a way to unify access across the board, regardless of device or location. For our key applications, we route traffic through Forcepoint CASB.Behavior analytics is useful for us. Because of remote workers and people connecting from all manner of places and accessing our applications, we are able to look at and see if there's any new or unknown connection. It's easy for us to detect it. If there's any change in that baseline, it's easier for us to spot it, and we get all manner of advanced notifications to tell us what has changed.
Regional Solutions Manager at a tech services company with 11-50 employees
Real User
Feb 16, 2023
We use the solution to detect the logins from specific geolocations. We are able to detect malware when it comes to logins around our cloud services. If you have about three failed attempts, it deactivates your accounts and the administrator has to reinstate you to log in. We have specified a list of countries, which we would and wouldn’t accept logins from. Once we have the geolocation policy set up, logins from the blacklisted countries get dropped. It gives us the complete capability to have a bit of control over the actions of our users. Like, we can see what our users are doing with the cloud applications. It also gives us the capability to scan and see Shadow IT applications our users are using as transaction applications. So, it serves its purpose.
We use Forcepoint for endpoint security. We profile for endpoint security devices such as laptops, and we configure different types of user groups for it.
Regional Solutions Manager (Sub-Sahara Africa) at Infodata
Real User
May 29, 2022
We are security-centered and security-conscious. It's more of a security thing for us, however, there are other environments that are more in compliance.
Forcepoint CASB (Cloud Access Security Broker) is a security solution which is designed to secure and monitor the use of cloud services within an organization. It helps organizations gain visibility and control over the cloud applications and services being used by their employees. Forcepoint CASB integrates with cloud service providers' APIs and employs various techniques such as traffic analysis, proxying, and API-based controls to provide security and visibility into cloud application...
Forcepoint CASB ensures that access to cloud applications is properly vetted and monitored. We have a lot of remote and field workers, and many staff members are not required to come into the office. We needed a way to unify access across the board, regardless of device or location. For our key applications, we route traffic through Forcepoint CASB.Behavior analytics is useful for us. Because of remote workers and people connecting from all manner of places and accessing our applications, we are able to look at and see if there's any new or unknown connection. It's easy for us to detect it. If there's any change in that baseline, it's easier for us to spot it, and we get all manner of advanced notifications to tell us what has changed.
People typically use Forcepoint CASB along with other Forcepoint tools such as Forcepoint Secure Web Gateway.
We use the tool for web security.
We use the solution to detect the logins from specific geolocations. We are able to detect malware when it comes to logins around our cloud services. If you have about three failed attempts, it deactivates your accounts and the administrator has to reinstate you to log in. We have specified a list of countries, which we would and wouldn’t accept logins from. Once we have the geolocation policy set up, logins from the blacklisted countries get dropped. It gives us the complete capability to have a bit of control over the actions of our users. Like, we can see what our users are doing with the cloud applications. It also gives us the capability to scan and see Shadow IT applications our users are using as transaction applications. So, it serves its purpose.
We use Forcepoint for endpoint security. We profile for endpoint security devices such as laptops, and we configure different types of user groups for it.
We are security-centered and security-conscious. It's more of a security thing for us, however, there are other environments that are more in compliance.
We primarily use the solution to protect data going out of cloud applications.
We provide solutions to our consumers.