Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Control D Reviews & Ratings
    183 Ratings
    Company Website
  • Kasm Workspaces Reviews & Ratings
    125 Ratings
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    163 Ratings
    Company Website
  • Google Chrome Enterprise Reviews & Ratings
    2,061 Ratings
    Company Website
  • ManageEngine EventLog Analyzer Reviews & Ratings
    208 Ratings
    Company Website
  • UTunnel VPN and ZTNA Reviews & Ratings
    118 Ratings
    Company Website
  • Criminal IP Reviews & Ratings
    17 Ratings
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    2,263 Ratings
    Company Website
  • PowerDMARC Reviews & Ratings
    252 Ratings
    Company Website
  • Criminal IP ASM Reviews & Ratings
    18 Ratings
    Company Website

What is Forcepoint URL Filtering?

Forcepoint URL Filtering is recognized as the leading and consistently updated solution for web filtering found on the market today. Powered by ThreatSeeker Intelligence, it analyzes and processes approximately 5 billion incidents daily from more than 155 countries, providing threat analytics updates to Forcepoint solutions at a remarkable speed of up to 3.2 updates per second. This robust filtering system effectively prevents web-based threats, significantly reducing malware infections, decreasing help desk inquiries, and lightening the load on vital IT staff. Engineered for ease of use, Forcepoint URL Filtering functions as a seamless filter and security mechanism that removes the complexities typically associated with proxy gateways. It features an extensive selection of over 120 security and web filtering categories, numerous controls for web applications and protocols, and offers more than 60 customizable reports with access based on user roles. In addition, it employs sophisticated techniques, including over 10,000 analytical and machine learning functions, all backed by real-time global threat intelligence through Forcepoint Web Security, which empowers organizations to quickly detect and address new threats. This proactive strategy not only safeguards businesses but also enhances their ability to navigate the continuously shifting landscape of cyber threats, ensuring they remain resilient against future challenges.

What is Forcepoint CASB?

Maximize the potential of cloud services for your business while ensuring that your data remains secure and under your control. By utilizing a Cloud Access Security Broker (CASB), you can efficiently oversee both sanctioned and unsanctioned cloud applications. Forcepoint CASB offers seamless integration with identity providers such as Ping and Okta, allowing you to build on existing frameworks you've established. If you haven't implemented an identity provider yet, the CASB can serve as a substitute, streamlining the addition of applications and enabling precise control over user access. Its intuitive interface is designed for easy navigation, ensuring that employees can use it without difficulty. While the risks posed by Shadow IT can leave sensitive data vulnerable, you can quickly pinpoint both managed and unmanaged cloud applications in real-time through your web proxy and firewall logs. Moreover, the cutting-edge Zero Trust Impossible Travel technology enables faster detection of compromised credentials by monitoring access patterns, locations, and timing from various devices. As data is transmitted to and from the cloud, and even between different cloud platforms, it is vital to protect it whether it is in transit or at rest. You have the ability to block data during transmission, encrypt or mask it, redact sensitive content, or apply watermarks for tracking purposes to ensure that your crucial information remains safe. Additionally, implementing proactive data protection strategies not only fortifies your security measures but also fosters a culture of trust within your organization, promoting a secure environment for collaboration and innovation.

Media

Media

Integrations Supported

Forcepoint ONE
Active Directory
Google Digital Risk Protection
Imperva CDN
Imperva DDoS Protection
Imperva WAF
OneTrust Privacy Automation
Scuba Database Vulnerability Scanner

Integrations Supported

Forcepoint ONE
Active Directory
Google Digital Risk Protection
Imperva CDN
Imperva DDoS Protection
Imperva WAF
OneTrust Privacy Automation
Scuba Database Vulnerability Scanner

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Forcepoint

Date Founded

1994

Company Location

United States

Company Website

www.forcepoint.com/product/url-filtering

Company Facts

Organization Name

Forcepoint

Date Founded

1994

Company Location

United States

Company Website

www.forcepoint.com

Categories and Features

Web Content Filtering

Antivirus
Automated Blacklist
Browser-based Management Portal
Category / Keyword Filters
LDAP Integration
Multi-Language Filtering
Reporting / Analytics
Roles / Permissions
SSL Inspection
Time-based Controls
VPN Blocking
White Label
Whitelisting

Categories and Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Popular Alternatives

Popular Alternatives

Check Point CloudGuard Reviews & Ratings

Check Point CloudGuard

Check Point Software Technologies
Forcepoint ONE Reviews & Ratings

Forcepoint ONE

Forcepoint
FortiCASB Reviews & Ratings

FortiCASB

Fortinet