Forcepoint Data Loss Prevention vs Webroot Advanced Email Encryption powered by Zix comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Forcepoint Data Loss Prevention and Webroot Advanced Email Encryption powered by Zix based on real PeerSpot user reviews.

Find out what your peers are saying about Microsoft, Forcepoint, Broadcom and others in Data Loss Prevention (DLP).
To learn more, read our detailed Data Loss Prevention (DLP) Report (Updated: April 2024).
771,212 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"One of the most valuable features is the set of built-in policies that Forcepoint has for PCI compliance. We just need to activate them and start working. Without them, it would be a big task to do a data transformation.""The solution’s content classification is the best.""A very user-friendly predefining feature.""The integration is great.""The fingerprinting technology is the solution's most valuable feature. It's unique to Forcepoint.""The GUI is very intuitive. That is the way I would explain its ease of use. It is straightforward.""We don't require a lot of downtime, but when we do then we are getting proper support with no issue.""With OCR and Risk Analysis, we are able to determine if anything sensitive is been shared. OCR helps us to safeguard those things and with risk ranking, we can determine which user is trying to violate policies multiple times even though they have been blocked to him or her."

More Forcepoint Data Loss Prevention Pros →

"They do a better job of determining what's real and what's not than most of the other solutions we have tried, and it's been very painless to use."

More Webroot Advanced Email Encryption powered by Zix Pros →

Cons
"It would be wonderful if the solution could develop more AI and machine learning capabilities. It would also be good if the solution was able to integrate with other ML and AI solutions. Right now, this is lacking.""The support could improve Forcepoint Data Loss Prevention.""The tool needs to integrate data classification.""An area for improvement in Forcepoint Data Loss Prevention is the complex UI and policy deployment. You have to find the policies, and then designing the policies is also tricky.""It would be better if we could easily integrate with other products. Suppose I want to integrate this DLP with some other CASB solutions or a firewall solution. In that case, it takes a considerable amount of time because Forcepoint DLP doesn't come with a legacy firewall or CASB solutions to integrate with it. We need to do it separately. It's not improvised for different sectors, and I need to look for other solutions. I'm investing a lot of time researching and implementing other solutions for other areas. That is one point where I can't feel satisfied with this Forcepoint DLP. The only problem we have faced is that it consumes most of the CPU whenever a Forcepoint DLP is deployed on an endpoint. This is when users feel some lag in their machine's performance or their Internet performance. That's when we uninstall and try to reinstall, or we'll give a cloud link to which it gets access. We use Forcepoint DLP for endpoint protection, not for email or cloud. For email and drive, we went with the Google DLP. Forcepoint DLP isn't as efficient on drive or chat, or email. For that, we have some specialized solutions, but it would be better to have a single console where you can control all these areas. It would be pretty easy for a consumer who is going to use this product. All in one shot, you can try to track it and enforce your policies on a single dashboard. That is one point currently lacking in Forcepoint, and I feel they need to work on it. In the next release, I would like to use this DLP across different solutions like network, firewall, email, or chat with a consolidated dashboard and with integration facilities with other solutions. Security should work as a whole. It shouldn't work individually in blocks. It does not serve our purpose. It should be integrated with multiple solutions. For that, it should have enough intelligence to work with other tools. I'm looking forward to seeing that kind of capability with Forcepoint.""My opinion is that the dashboard could be improved and made more user-friendly. They do not enable a wide range of proper inquiries and we need to identify much of what we need on our own, like incident severity.""I am not able to get support directly from Forcepoint.""Feature requests do take some time to implement."

More Forcepoint Data Loss Prevention Cons →

"They have some areas that could be improved. For example, we also use this solution for email encryption, which was clunky and could be improved, but the email security itself has been excellent."

More Webroot Advanced Email Encryption powered by Zix Cons →

Pricing and Cost Advice
  • "It's not the cheapest solution but it's not the most expensive. It's a good price for a good product."
  • "The pricing and licensing are okay."
  • "The pricing and licensing fees could be improved."
  • "I prefer Forceoint because it is cheaper than Symantec."
  • "The cost for the product for our use is less than $10 per user."
  • "Forcepoint DLP is a bit expensive."
  • "One feature that I'm getting ready to take advantage of more is the ability to add more data crawlers to the DLP on-prem environment, without any extra Forcepoint costs or licensing needed for that additional data server. That will help in reducing the stress on the data server that we're using now."
  • "Its pricing is quite low considering the features they are offering. As compared to other solutions, it is reasonable. They do have professional support. If we need professional support, then there will be additional costs."
  • More Forcepoint Data Loss Prevention Pricing and Cost Advice →

  • "In terms of pricing, I believe they provide excellent value."
  • More Webroot Advanced Email Encryption powered by Zix Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Data Loss Prevention (DLP) solutions are best for your needs.
    771,212 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The technical support for the solution is very good.
    Top Answer:The product has mid-range pricing, which is worth the money.
    Top Answer:Some of our company's customers who want the tool to deal with some of their use cases are macOS users. When it comes to the area of USB control, macOS takes five to ten seconds, meaning there are… more »
    Ask a question

    Earn 20 points

    Ranking
    Views
    7,025
    Comparisons
    4,619
    Reviews
    24
    Average Words per Review
    433
    Rating
    7.8
    Views
    220
    Comparisons
    163
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Comparisons
    Also Known As
    Forcepoint DLP, Forcepoint Data Security Suite, Websense Data Security Suite
    Zix Email Encryption, ZixEncrypt
    Learn More
    Overview

    Forcepoint Data Loss Prevention (DLP) is a data loss prevention tool that protects users from advanced threats and data breaches. Forcepoint DLP’s technologies can quickly identify and protect sensitive data and provide insight and awareness into attacks on endpoint devices both on and off the network.

    With company data constantly on the move, data security teams must have visibility and control across all channels - endpoint, web, network, email, and cloud. Forcepoint DLP provides protection and visibility across all data in the cloud as well as on-premises. One of the key features of Forcepoint DLP is its ability to identify data at rest, in motion, and in use and efficiently secure sensitive information.

    Forcepoint DLP key features:

    • Identify, remediate and secure sensitive data with network, cloud, and endpoint discovery.
    • Central management of policies across all channels, including cloud, endpoint, network, web, and email.
    • Optical Character Recognition (OCR) to identify data embedded in images.
    • Personally Identifiable Information (PII) for validation checks, real name detection, and proximity analysis.
    • Custom encryption identification for exposing concealed data.
    • Machine learning, which allows users to train the system to identify unfamiliar data. Users can provide the engine with positive and negative examples so similar data can be flagged.
    • Analytics for identifying changes in user behavior. These analytics are leveraged to better understand user risk and are then implemented as automated policy enforcement based on the risk level of the user.
    • Cloud protection for monitoring and preventing the loss of sensitive data online, and assessing the risk posed by visited websites.

    Reviews from Real Users

    Forcepoint DLP stands out among its competitors for a number of reasons. Two major ones are its risk analysis features and its OCR and data discovery capabilities.

    Allan P., an associate consultant at Atos, writes, “With OCR and Risk Analysis, we are able to determine if anything sensitive has been shared. OCR helps us to safeguard those things and with risk ranking, we can determine which user is trying to violate policies multiple times even though they have been blocked. It does require additional servers, as the processing and result of the incident is high, however, it's worth using to see all the use cases being met with these two features as well. They are the best features provided by Forcepoint.”

    Mahesh D., A senior manager at 2Five1, notes, “The workflow remediation is quite good. That is a key feature because of which it has the upper hand over other DLP solutions. Endpoint protection, web protection, network protection, and storage use are valuable features. Among these, endpoint protection is most valuable. It has good policies and good mechanisms to detect incidents. The workflow remediation is quite good. That is a key feature because of which it has the upper hand over other DLP solutions. Endpoint protection, web protection, network protection, and storage use are valuable features. Among these, endpoint protection is most valuable. It has good policies and good mechanisms to detect incidents.”

    Proven Content Filters

    To send an encrypted email, your employees simply create a message and hit ‘send'. Our content filters take care of the rest.

    Transparent Delivery

    When your employees receive an encrypted reply, the experience is just as easy. They simply open the encrypted email like regular email. No matter where they are or what device they use, if your customers and partners have email, they can easily receive encrypted email.

    Convenient Recipient Experience

    Our patented Best Method of Delivery ensures all messages are delivered in the most secure and easy manner possible, including transparent, pull and push methods. For pull delivery, secure web portals can be in the cloud or on-site. Also among our robust methods is secure PDF for statement delivery.

    Simplified Quarantined Messages

    If an email is quarantined, then employees, managers and IT receive notification to view the message and policy violations and can delete the email, or justify and release it for delivery.

    Sample Customers
    Alphawest, Betsson, Cellcom Israel Ltd., Chelsea & Westminster Hospital, Confartigianato Vicenza, EverBank, Finansbank, iGATE, Landa Digital Printing, Northern California Bank, Reliance Capital, Remosa, Toyota, Scavolini, Zim Integrated Shipping Services
    Erie County of Pennsylvania’s Human Services Department, Justice Federal Credit Union, STAR Financial Group, Chisago County, Minn., The National Banks of Central Texas, Kentucky Retirement Systems (KRS), Frankfort, Ky, Athletico Physical Therapy, District of Columbia Retirement Board (DCRB), CIBM Bank
    Top Industries
    REVIEWERS
    Financial Services Firm27%
    Computer Software Company19%
    Security Firm8%
    Comms Service Provider8%
    VISITORS READING REVIEWS
    Financial Services Firm15%
    Computer Software Company14%
    Manufacturing Company9%
    Insurance Company6%
    VISITORS READING REVIEWS
    Computer Software Company15%
    Financial Services Firm12%
    Government11%
    Healthcare Company8%
    Company Size
    REVIEWERS
    Small Business51%
    Midsize Enterprise9%
    Large Enterprise40%
    VISITORS READING REVIEWS
    Small Business20%
    Midsize Enterprise14%
    Large Enterprise66%
    VISITORS READING REVIEWS
    Small Business38%
    Midsize Enterprise17%
    Large Enterprise45%
    Buyer's Guide
    Data Loss Prevention (DLP)
    April 2024
    Find out what your peers are saying about Microsoft, Forcepoint, Broadcom and others in Data Loss Prevention (DLP). Updated: April 2024.
    771,212 professionals have used our research since 2012.

    Forcepoint Data Loss Prevention is ranked 2nd in Data Loss Prevention (DLP) with 52 reviews while Webroot Advanced Email Encryption powered by Zix is ranked 13th in Secure Email Gateway (SEG). Forcepoint Data Loss Prevention is rated 8.0, while Webroot Advanced Email Encryption powered by Zix is rated 7.0. The top reviewer of Forcepoint Data Loss Prevention writes "DLP great for encryptions; tech support is quite helpful". On the other hand, the top reviewer of Webroot Advanced Email Encryption powered by Zix writes "Inexpensive, with good email security, but the technical support could be improved". Forcepoint Data Loss Prevention is most compared with Microsoft Purview Data Loss Prevention, Digital Guardian, Symantec Data Loss Prevention, CoSoSys Endpoint Protector and Zscaler DLP, whereas Webroot Advanced Email Encryption powered by Zix is most compared with Microsoft Defender for Office 365, Proofpoint Email Protection and Microsoft Exchange Online Protection (EOP).

    We monitor all Data Loss Prevention (DLP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.