We performed a comparison between Forcepoint Data Loss Prevention and GitGuardian Platform based on real PeerSpot user reviews.
Find out in this report how the two Data Loss Prevention (DLP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Forcepoint offers many policies that conform to global DLP best practices, including requirements specific to regions like the Middle East, Europe, etc. They have a policy database in their product. That feature is unique to Forcepoint. Their AI and fingerprinting are incredibly effective and robust. We have tested it multiple times. It always catches the correct data being leaked."
"Scalability-wise, I rate this solution a nine out of ten."
"Has multiple modules and is good with integration."
"The solution is easy to manage."
"The most valuable feature of this solution is that it captures where the data is being moved."
"The initial setup process went well."
"Regardless of the size of your company, this solution can be scaled accurately."
"Forcepoint has been the leader in the space for many years and they, are very well established, and mature."
"What is particularly helpful is that having GitGuardian show that the code failed a check enables us to automatically pass the resolution to the author. We don't have to rely on the reviewer to assign it back to him or her. Letting the authors solve their own problems before they get to the reviewer has significantly improved visibility and reduced the remediation time from multiple days to minutes or hours. Given how time-consuming code reviews can be, it saves some of our more scarce resources."
"The most valuable feature is the general incident reporting system."
"It actually creates an incident ticket for us. We can now go end-to-end after a secret has been identified, to track down who owns the repository and who is responsible for cleaning it up."
"Presently, we find the pre-commit hooks more useful."
"It enables us to identify leaks that happened in the past and remediate current leaks as they happen in near real-time. When I say "near real-time," I mean within minutes. These are industry-leading remediation timelines for credential leaks. Previously, it might have taken companies years to get credentials detected or remediated. We can do it in minutes."
"The most valuable feature of GitGuardian is that it finds tokens and passwords. That's why we need this tool. It minimizes the possibility of security violations that we cannot find on our own."
"When they give you a description of what happened, it's really easy to follow and to retest. And the ability to retest is something that you don't have in other solutions. If a secret was detected, you can retest if it is still there. It will show you if it is in the history."
"GitGuardian has many features that fit our use cases. We have our internal policies on secret exposure, and our code is hosted on GitLab, so we need to prevent secrets from reaching GitLab because our customers worry that GitLab is exposed. One of the great features is the pre-receive hook. It prevents commits from being pushed to the repository by activating the hook on the remotes, which stops the developers from pushing to the remote. The secrets don't reach GitLab, and it isn't exposed."
"The product is good, but the biggest issue is needing direct support from Forcepoint."
"The policy update size and agent size could be improved. We would also like to have a proper solution for Linux OS which Forcepoint does not offer."
"The deployment can be difficult."
"Everything takes a long time, as it does in every software company, especially since COVID. That is something I notice with every product I use."
"There is no support for the Bangla (Bengali) language, so we cannot use the Forcepoint technology for Bangla documents."
"It would be better if we could easily integrate with other products. Suppose I want to integrate this DLP with some other CASB solutions or a firewall solution. In that case, it takes a considerable amount of time because Forcepoint DLP doesn't come with a legacy firewall or CASB solutions to integrate with it. We need to do it separately. It's not improvised for different sectors, and I need to look for other solutions. I'm investing a lot of time researching and implementing other solutions for other areas. That is one point where I can't feel satisfied with this Forcepoint DLP. The only problem we have faced is that it consumes most of the CPU whenever a Forcepoint DLP is deployed on an endpoint. This is when users feel some lag in their machine's performance or their Internet performance. That's when we uninstall and try to reinstall, or we'll give a cloud link to which it gets access. We use Forcepoint DLP for endpoint protection, not for email or cloud. For email and drive, we went with the Google DLP. Forcepoint DLP isn't as efficient on drive or chat, or email. For that, we have some specialized solutions, but it would be better to have a single console where you can control all these areas. It would be pretty easy for a consumer who is going to use this product. All in one shot, you can try to track it and enforce your policies on a single dashboard. That is one point currently lacking in Forcepoint, and I feel they need to work on it. In the next release, I would like to use this DLP across different solutions like network, firewall, email, or chat with a consolidated dashboard and with integration facilities with other solutions. Security should work as a whole. It shouldn't work individually in blocks. It does not serve our purpose. It should be integrated with multiple solutions. For that, it should have enough intelligence to work with other tools. I'm looking forward to seeing that kind of capability with Forcepoint."
"The protection of personal data needs to be improved."
"The reporting features, the real-time reporting, can be improved in Forcepoint. On the dashboard, we don't have a feature that shows real-time incidents. We have to schedule a report in the environment."
"GitGuardian's hook and dashboard scanners are the two entities. They should work together as one. We've seen several discrepancies where the hook is not being flagged on the dashboard. I still think they need to do some fine-tuning around that. We don't want to waste time."
"Right now, we are waiting for improvement in the RBAC support for GitGuardian."
"There are some features that are lacking in GitGuardian. The more we grow and the more engineers we have, the more it will become difficult to assign an incident because the assignment is not automatic. I know they are working on that and we are waiting for it."
"One of our current challenges is that the GitGuardian platform identifies encrypted secrets and statements as sensitive information even though they're secured."
"The purchasing process is convoluted compared to Snyk, the other tool we use. It's like night and day because you only need to punch in your credit card, and you're set. With GitGuardian, getting a quote took two or three weeks. We paid for it in December but have not settled that payment yet."
"GitGuardian could have more detailed information on what software engineers can do. It only provides some highly generic feedback when a secret is detected. They should have outside documentation. We send this to our software engineers, who are still doing the commits. It's the wrong way to work, but they are accustomed to doing it this way. When they go into that ticket, they see a few instructions that might be confusing. If I see a leaked secret committed two years ago, it's not enough to undo that commit. I need to go in there, change all my code to utilize GitHub secrets, and go on AWS to validate my key."
"I would like to see more fine-grained access controls when tickets are assigned for incidents. I would like the ability to provide more controls to the team leads or the product managers so that they can drive what we, the AppSec team, are doing."
"The main thing for me is the customization for some of the healthcare-specific identifiers that we want to validate. There should be some ability, which is coming in the near future, to have custom identifiers. Being in healthcare, we have pretty specific patterns that we need to match for PHI or PII. Having that would add a little bit extra to it."
More Forcepoint Data Loss Prevention Pricing and Cost Advice →
Forcepoint Data Loss Prevention is ranked 2nd in Data Loss Prevention (DLP) with 52 reviews while GitGuardian Platform is ranked 6th in Data Loss Prevention (DLP) with 24 reviews. Forcepoint Data Loss Prevention is rated 8.0, while GitGuardian Platform is rated 9.0. The top reviewer of Forcepoint Data Loss Prevention writes "DLP great for encryptions; tech support is quite helpful". On the other hand, the top reviewer of GitGuardian Platform writes "It dramatically improved our ability to detect secrets, saved us time, and reduced our mean time to remediation". Forcepoint Data Loss Prevention is most compared with Microsoft Purview Data Loss Prevention, Digital Guardian, Symantec Data Loss Prevention, CoSoSys Endpoint Protector and Zscaler DLP, whereas GitGuardian Platform is most compared with SonarQube, GitHub Advanced Security, Cycode, Snyk and Microsoft Purview Data Loss Prevention. See our Forcepoint Data Loss Prevention vs. GitGuardian Platform report.
See our list of best Data Loss Prevention (DLP) vendors.
We monitor all Data Loss Prevention (DLP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.