Forcepoint ONE vs Netskope comparison

Cancel
You must select at least 2 products to compare!
Lookout Logo
575 views|450 comparisons
71% willing to recommend
Forcepoint Logo
1,158 views|784 comparisons
100% willing to recommend
Netskope Logo
8,076 views|6,504 comparisons
97% willing to recommend
Comparison Buyer's Guide
Executive Summary
Updated on Feb 14, 2024

We compared Netskope and Forcepoint ONE based on our users' reviews across four parameters. After reading all of the collected data, you can find our conclusion below.

Netskope offers comprehensive data protection, advanced threat protection, advanced analytics, and granular policy enforcement. Users appreciate the competitive pricing, positive return on investment, and excellent customer service. Forcepoint ONE is highly regarded for robust security measures, intuitive interface, seamless integration, and data protection. Users praise the pricing, setup cost, licensing, and customer service of Forcepoint ONE.

Features: Netskope offers valuable features such as comprehensive data protection capabilities, advanced threat protection, advanced analytics, and granular policy enforcement. Forcepoint ONE is highly regarded for its robust security measures, intuitive user interface, seamless integration capabilities, and advanced data protection features.

Pricing and ROI: Netskope offers competitive pricing and a straightforward setup process with reasonable licensing terms. Forcepoint ONE also offers competitive pricing and a reasonable setup cost, with a straightforward and hassle-free licensing process. Netskope is praised for delivering increased security and data protection, enhanced visibility and control over cloud services, efficient threat detection, seamless integration, and overall cost savings. Forcepoint ONE's impact on ROI is not explicitly mentioned by users.

Room for Improvement: Netskope users have expressed the need for a more intuitive interface, better customer support, improved performance during high-traffic periods, and more comprehensive reporting. Forcepoint ONE users want a more intuitive UI, better documentation and training resources, improved speed and performance, and enhanced customization options.

Deployment and customer support: The initial setup phase of Netskope is easy, with some users mentioning that it can be completed in a matter of weeks or even a couple of days. Deployment on the cloud is quick, however, the implementation phase is more complex. The initial setup of Forcepoint ONE is straightforward. Users receive a master administrator login and can onboard more addresses. Netskope users are satisfied with the company's customer service, praising their responsiveness and knowledgeable assistance. Forcepoint ONE customers also appreciate their professional and attentive support, describing it as reliable and top-notch.

The summary above is based on 16 interviews we conducted with Netskope and Forcepoint ONE users. To access the review's full transcripts, download our report.

To learn more, read our detailed Forcepoint ONE vs. Netskope Report (Updated: March 2024).
768,578 professionals have used our research since 2012.
Q&A Highlights
Question: Evaluating CASBs. Looking for community feedback on some vendors.
Answer: I have only done a peripheral review of CASB vendors in the past few months, but I do agree that the top ones to consider right now are Skyhigh Networks and Netskope. When looking at a CASB, be sure not only to consider if they offer all the right checkboxes, but take a look under the covers to see how they are handling those checkboxes. Sometimes, integration between the components is severely lacking or disjointed even when they have a high feature list.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The solution is stable.""On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator.""The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices.""The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."

More Lookout Pros →

"The core CASB solution is the most valuable part. It allows us to put policies in place around which devices can log into our cloud applications. We have a policy that states that only company devices can access these cloud applications.""Forcepoint ONE is okay for me, and I find it a very good solution. Its most valuable feature is monitoring. Its monitoring is very good, and it can communicate with a SIEM system. I also find the DLP feature of Forcepoint ONE good.""The solution is very good when it comes to securing us against data leakage, because of the other proxy. It also has API scanning or data at rest. It inspects data in motion, which is the proxy, and then it has the data at rest, which is the API scanning. We can inspect for anything we want: file fingerprinting, PHI-sensitive data, PCI-sensitive data. It does not matter. We can usually find it and block it in transit and do our remediation with it. It could either be block, encrypt, or allow and watermark the file to follow it and see where it goes. It allows for those different scenarios.""The initial setup was straightforward, which was a huge win. That mostly goes to the fact that they are agentless. We didn't have to sit there deploying thousands of agents and all the things that go along with that type of deployment. We were up and running very quickly.""The platform's feature that has been most beneficial for our web security is its capability to replicate rules.""The solution’s AJAX-VM provides constant reverse proxy uptime. It has been very positive for our security operations. When people are trying to access the SaaS solution, it protects us from downloading any of that data and experiencing any type of attacks""We are able to verify what is getting saved out onto the cloud. It allows us to have some DLP rules, since we have to be HIPAA compliant. If some personal health information has been uploaded to Office 365, then we are able to detect that sort of thing and account for it. We have set up rules to prevent people from doing that.""The biggest thing that I like about this product is that it's easy to use and teach. When we have somebody new starting to work with the product, it's easy to teach them. It's also easy to use the product as it does so much."

More Forcepoint ONE Pros →

"The feature that I like best is the GUI.""Their technical support is very good.""Netskope is a really good product. I cannot segregate which features are the most valuable. We find most of the features to be valuable. It gives us what we are looking for.""Netskope's control is user-friendly and comprehensible. It also helps in conveying information effectively as a company, making it crucial for customer satisfaction.""It has hundreds of features and many of them are useful.""Technical support is pretty good.""I have found the most useful features to be the Web Secure Gateway, CASB, infrastructural service scanning, and Zero Trust.""The client size and architectural components in Netskope are far better than other solutions."

More Netskope Pros →

Cons
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now.""The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer""From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products.""Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."

More Lookout Cons →

"I wish they would advance more into the endpoint DLP solution. Currently they do not do anything around endpoint, they're still strictly cloud-based. The forward proxy is really the only thing they do. What I would like to see them do is to scan machines, workstations and servers, for information we might not want on those machines. That would be huge.""Their new SASE (secure access service edge) product would have been the one thing I would have requested. Now that they have that platform, I'd like to see it as integrated and seamless as possible with the core product. That's what they're working towards and that's where we're seeing the advancements.""Integration into different multi-factor authentication tools. On their page, they tout Duo, but I don't use Duo. I use another vendor. Not that they don't interact, but it takes a little bit more doing. Any amount of efficiencies here would help.""We encounter challenges in determining whether certain features for blocking certain file types or preventing automatic downloads are functioning correctly.""One area for improvement in Forcepoint ONE is that you'll need more training to install the solution yourself. I practiced in a laboratory and I needed more technical information to do the installation.""Bitglass integration with some IDP providers needs improvement.""In our environment, when an Active Directory password changes, we tend to have some latency issues with access. It takes about 15 minutes before that password is accessible through Bitglass after the change. That would be the major thing I see as a negative.""Initially, we had some challenges that Bitglass resolved quickly. The challenges were around communication. There didn't seem like there was the right level of communication within the Bitglass organization. Once we brought the issues up at a higher level, then they were resolved."

More Forcepoint ONE Cons →

"Support services could definitely be improved. Support is the one area that can always use improvement. It's an evolving thing, so based on demand and based on market requirement and the way market is moving towards.""The solution's implementations can be made much easier because, currently, it is complex in nature.""The solution is still pretty new to the CASB environment.""It needed some fine-tuning on core business sites that we used, which were sensitive to what we term a man-in-the-middle certificate by design. Some sites were not tolerant because they presented as potentially malicious. So, we just had to make some tweaks so that it would bypass or interpret it.""The product's high price is an area of concern where improvements are required.""Lacking in local customer support.""In some cases, when you have a lot of policies, it can get confusing for users and you can get lost in the GUI.""The dashboard performance could be much better and faster, but because it is a complicated product, it takes time for the dashboard to process."

More Netskope Cons →

Pricing and Cost Advice
  • "The pricing is fair; it's comparable to our previous solution, and we carried out multiple POCs and POVs (proof of value). The product is worth the money we pay for it."
  • "Lookout is definitely on the lower end when it comes to price point and that seems to be the only differentiator. The technology is in place in this space and it's really about who is coming in at the better price point now."
  • "In terms of feature performance versus cost, they're a good value."
  • "The licensing costs are good. Prisma has much more options and support for security, but it has a higher cost. For example, Lookout costs 2/3rd of Prisma's licensing price."
  • More Lookout Pricing and Cost Advice →

  • "There is training involved. If you're going to add more people to it, such as cross train more of your group, there's a cost. Other than that, that's it. We have paid exactly what the invoices have said. We signed a three-year contract and not gone above it."
  • "We have our pricing by user. We do our pricing agreements annually. There are also additional costs for maintenance."
  • "Typically, the longer you price forward, the better off you're going to be. They have been very willing to work with us on pricing."
  • "The licensing cost for Forcepoint ONE would depend on the features, but the pricing is very competitive here in Brazil. The solution offers a good price, and I would rate it a three or a four in terms of pricing. I don't have information on whether there are additional costs apart from the standard licensing fees for Forcepoint ONE."
  • "When considering only the cost, the solution may appear to be costly; however, when evaluated in terms of commercial value, Bitglass is not expensive."
  • More Forcepoint ONE Pricing and Cost Advice →

  • "Pricing is a little expensive but it is affordable."
  • "They should work on licensing costs."
  • "The pricing is competitive."
  • "Licensing is on a yearly basis."
  • "The price of the solution is fair but it depends on your use case."
  • "There is a license required for this solution and there are many licensing models available. For example, what applications are covered as part of the license."
  • "I recall that the price was considerably cheaper than that of Zscaler. It was around 60,000 AUD for 1,000 users per year and included some training and some premier support offerings. If we wanted to take advantage of the CASB capabilities, then there was an additional subscription fee, for which we didn't have the budget. On price, I would give Netskope a three or four out of five because it's quite expensive, but it offers a lot of value."
  • "Licensing fees are paid annually."
  • More Netskope Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Cloud Access Security Brokers (CASB) solutions are best for your needs.
    768,578 professionals have used our research since 2012.
    Answers from the Community
    Tim Thomasson
    it_user754782 - PeerSpot reviewerit_user754782 (Reporting Analyst at a energy/utilities company with 10,001+ employees)
    Real User

    Hi Tim, I'm currently a student and doing research about cyber security market, may I know how do you narrow your list down to these 5 vendors?

    ramesh1923 - PeerSpot reviewerramesh1923 (Technical Specialist with 5,001-10,000 employees)
    Real User

    Hi, I am working on both Skyhigh and Netskope. The both has their own unique features. List down your requirement and do the POC with the said products.

    Skyhigh is efficiently handling both shadow IT and sanctioned IT applications. DLP, threat protection and access controls are the key features of skyhigh.

    Netskope is good in access control.

    Regards / Ramesh M

    it_user645183 - PeerSpot reviewerit_user645183 (Product Marketing Engineer at a tech company with 10,001+ employees)
    Real User

    Hello,

    The CASB space is booming right now. Everyone is leveraging the cloud for various reasons and having a CASB in place is paramount to security. What CASB to get is really a matter of your business requirements. What exactly are you trying to do? Do you want to get a handle on all the Shadow IT that your company is currently exposed to and set up a plan for such activity? Do you want to apply DLP policies to safeguard your data? Perhaps GDPR and other regulatory issues are forcing you to get into compliance? There are many reasons for adopting a CASB solution, the best place to start is with an Audit of your current traffic and finding out what Shadow IT is present, any related Shadow Data that needs to be monitored, and come up with a plan on how to handle SaaS apps in the cloud. The best CASB vendors out there will offer the audit service as part of the CASB solution. From there, you can design policy and stipulate what cloud apps to sanction, which ones to block, and how to coach users during any suspect activity. The end goal is to keep your users productive and happy while securing your data in cloud apps.
    For an unbiased answer, I would direct you to Gartner and Forrester for reports on CASB. They will detail what the landscape looks like, who the vendors are, what the pillars of a good CASB solution should entail, as well as some features and functionality that are specific to the various CASB vendors. Gartner has a CASB overview document that is very handy and they are currently working on a magic quadrant for the existing vendors. Forrester has released a “ForresterWaveCASB” document that dives into the vendors and who they think are the best based on market presence, features, etc.
    Of course, Symantec offers a CASB solution that should be added to your list of vendors for review. Do not look at a CASB vendor without looking at Symantec. Currently, Forrester ranks Symantec as the number 1 CASB vendor in the marketplace. Symantec offers the following:

    · Cloud app discovery and analysis

    · Data governance and protection

    · Threat detection and incident response

    · A CASB that integrates with Symantec DLP (the industry’s leading DLP solution)

    · Integration with endpoint

    · Integration with Secure Web Gateway (Blue Coat proxies are the best in the industry)

    · Authentication with Symantec VIP

    · Field level tokenization and encryption

    · File-level encryption

    Consider these questions when looking for a CASB vendor:

    · What do yo udo when you need to apply consistent DLP policies to data in the cloud and on premise?

    · What are your options for encrypting confidential data

    · Can you safeguard against confidential data transfer to unsanctioned cloud apps or personal cloud accounts?

    · Can the CASB automatically identify and respond when a user account has been compromised?

    · Does the CASB automatically classify confidential data or do you have to build a system from scratch?

    it_user216333 - PeerSpot reviewerit_user216333 (Information Security Engineer at a retailer with 10,001+ employees)
    Real User

    Netskope is really good. MCAS meets the requirements but lacking features, it is cheaper though. Depends on your requirements, netskope has an optional light weight desktop agent which makes monitoring easy.

    Do you have any specific requirements?

    it_user489630 - PeerSpot reviewerit_user489630 (Works)
    Vendor

    we use ciphercloud. basically, all of them handles: office, google, & salesforce. now with the GDPR happening in our european offices they're mainly SAP & ciphercloud is the only one approved by SAP.

    it_user720069 - PeerSpot reviewerit_user720069 (CTO, CISO, Co-Founder with 11-50 employees)
    Vendor

    At the risk of giving a solution without knowing the situation, some very broadbrush advice would be to look at these vendors in this priority order. That said, given the right environment, any of them could be the best fit. CASB is not a market that is matured with standard architectures and features, so it is advisable to consider the specific requirements before making a decision. Another way to say this is there is not one that is universally superior in most situation.

    1. Netskope
    2. Skyhigh
    3. CipherCloud
    4. Bitglass
    5. Microsoft Cloud App Security
    The ones higher on this list tend to have a greater number of use cases where they do a good job. I don’t feel I can publish pros and cons in this forum.

    ramesh1923 - PeerSpot reviewerramesh1923 (Technical Specialist with 5,001-10,000 employees)
    Real User

    We have used Skyhigh and its pretty good to handle cloud sanctioned IT applications like Office365, Google APPs and salesforce etc.

    Easy to deploy, better application, device and user visibility.

    Earl Clark - PeerSpot reviewerEarl Clark
    Real User

    No help on any of these, but thanks for the question. For a holistic approach (because anything less is insufficient), I've begun using Sophos appliances, services, and endpoint protection which all speak with each other and really fortify a network on all fronts. Services take up resources, so be sure to invest in an appliance powerful enough to serve all your endpoints effectively. Hope this helps.

    Questions from the Community
    Top Answer:The licensing costs are good. Prisma has much more options and support for security, but it has a higher cost. For… more »
    Top Answer:The solution could improve identity integration as well. Zero trust, it's a good start as a zero-trust solution… more »
    Top Answer:The platform's feature that has been most beneficial for our web security is its capability to replicate rules.
    Top Answer:When considering only the cost, the solution may appear to be costly; however, when evaluated in terms of commercial… more »
    Top Answer:While we have some product information available, there are instances where we need a comprehensive understanding of all… more »
    Top Answer:We researched Netskope but ultimately chose Zscaler Netskope is a cloud access security broker that helps identify… more »
    Top Answer:The product's analytics part is pretty fine.
    Comparisons
    Also Known As
    CipherCloud
    Bitglass
    Netskope CASB
    Learn More
    Overview

    Lookout is a well-established and powerful secure web gateway (SWG) solution that protects more than 200 million users from threats that can result from the penetration of unsecured web traffic into their networks. Lookout is designed to enable organizations to work remotely while maintaining a tight blanket of security over their confidential business data. It provides administrators with security that extends from their endpoints to the cloud service that they are using to run their organization’s network. 

    Users of Lookout are able to proactively detect threats and keep themselves secure from a field of threats that constantly evolves. IT teams can protect their organizations without having to rely on any other security solutions. This singular solution can run on multiple kinds of mobile devices. The privacy of individuals is preserved while keeping compliance rules intact. Additionally, users gain access to a number of tools that enable them to prevent security breaches from taking place.

    Lookout Benefits

    Some of the ways that organizations can benefit by deploying Lookout include:

    • Ease of deployment. Lookout is a solution whose design makes it easy for users to deploy it. It provides users with simple, step-by-step instructions that remove the need for organizations to devote extensive amounts of time to make sure that it is properly set up. Anyone can quickly set up the solution without undergoing technical training. 
    • Built-in support. Users of the Lookout application have access to built-in demos that can teach them how to use various solution features. Instead of spending time trying to figure out the application, users can watch the demo that is most relevant to them and see for themselves how that particular feature is used.
    • Easy-to-use user interface. Lookout’s user interface is laid out in an intuitive way that makes it easy for administrators to navigate. This interface is present in both the mobile and desktop versions of this solution. 
    • Settings customization. Lookout has a built-in settings customization menu. This makes it possible for administrators to easily customize their settings so that they best conform to their needs. 

    Lookout Features

    • Activity monitoring and activity tracking. Lookout’s activity monitoring and activity tracking capabilities enable users to keep a close eye on the activities that are taking place in their networks. IT teams and administrators have the ability to watch their networks for any unusual activity. These features ensure that organizations can keep ahead of any potential threats. They provide the kinds of insights and warnings that make the jobs of those IT teams and administrators much easier and more streamlined. 
    • Encryption. Organizations that employ Lookout can encrypt their networks and keep crucial business data from being read by unauthorized parties. This feature keeps the secrets organizations are trying to keep out of the wrong hands.
    • Anti-virus tools. Lookout provides users with tools to block threats from harming their networks. These tools can successfully block 99.6 percent of threats without raising false alarms. 

    Forcepoint ONE is a comprehensive cybersecurity platform that provides organizations with a unified approach to protecting their critical data and assets. It offers a range of solutions that cover everything from network security and cloud security to data protection and insider threat prevention. With Forcepoint ONE, organizations can gain complete visibility into their security posture, identify potential threats, and take proactive measures to mitigate risks. One of the key features of Forcepoint ONE is its ability to provide real-time visibility into user behavior across all endpoints, networks, and cloud environments. This allows organizations to quickly identify and respond to potential threats, such as insider threats or malicious activity from external actors. Additionally, Forcepoint ONE offers advanced threat intelligence capabilities that leverage machine learning and AI to detect and respond to emerging threats. Another important aspect of Forcepoint ONE is its data protection capabilities. The platform offers a range of solutions for protecting sensitive data, including data loss prevention (DLP), encryption, and secure web gateways. These solutions help organizations ensure that their critical data is protected both at rest and in transit, regardless of where it is stored or accessed. Forcepoint ONE is a powerful cybersecurity platform that offers a comprehensive set of solutions for protecting organizations against a wide range of threats. With its advanced threat intelligence capabilities, real-time visibility into user behavior, and robust data protection features, Forcepoint ONE is an ideal choice for organizations looking to take a proactive approach to cybersecurity.

    Netscope is a Secure Access Service Edge (SASE) platform that includes core products such as Cloud Access Security Broker (CASB) and Security Service Edge (SSE).

    Netskope CASB is a cloud access security broker tool that allows you to adopt cloud applications and services without sacrificing security. The solution makes it possible to manage the movement of sensitive data between cloud app instances and in the context of app risk and user risk. With Netskope’s industry-leading cloud security solution, you can also prevent sensitive data from being exfiltrated from your environment by risky insiders or malicious cybercriminals who have breached your perimeter.

    Netskope CASB Features

    Netskope CASB has many valuable key features. Some of the most useful ones include:

    • Cloud app risk scoring: With this feature you can automatically audit your traffic to discover your overall risk profile.
    • Advanced data loss protection: The solution’s data loss protection capabilities provide contextual awareness of content being used in the cloud and include machine learning enhancements to simplify, expedite, and accurately scan and classify data.
    • Granular visibility and control: The Netskope CASB solution gives you inline visibility for thousands of apps (managed and unmanaged) in use, including users, file names, activity, and other contextual information.
    • Real-time enforcement: Netskope CASB offers real-time enforcement of security policies to prevent data loss and stop threats.
    • Streamlined operations: Because of its streamlined operations, you can identify, mitigate, and remediate insider threats, compromised accounts, and privileged user threats across web and cloud applications within a single centralized administrative console.
    • Global scale and performance: The solution runs on NewEdge, a carrier-class global network, to provide maximum performance and efficacy worldwide.

    Netskope CASB Benefits

    There are many benefits to implementing Netskope CASB. Some of the biggest advantages the solution offers include:

    • Granular control of personal devices: With Netskope CASB, you can enforce granular control of unmanaged devices that have single-sign-on (SSO) access to managed cloud services, like Box and Microsoft 365.
    • Data protection: The solution has a single pane of glass and a policy interface that is easy to use to create security policies across cloud services, apps, and digital assets.
    • Find cloud services in use and assess risk: Netskope CASB can help you discover 50,000+ cloud apps and also provides risk-ratings for cloud apps so you can devise appropriate security policies.
    • Data exfiltration prevention: By using this solution, you can prevent users on corporate cloud services who download sensitive data from uploading that data to unmanaged or personal cloud apps.
    • Protection against cloud threats: Netskope CASB enables you to stop malware and advanced threats from infected users spreading through your organization. The solution directly blocks malware, whether it’s delivered from collaboration tools or downloaded from a cloud storage service to a sync client.

    Reviews from Real Users

    Netskope CASB is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it offers great reporting, has a good tracking mechanism, and has a solid Cloud Control feature.

    Prerna S., Senior Information Security Analyst II at Workato, says, “[Netskope] CASB has a lot of good features; their reporting and tracking mechanism is amazing.”

    PeerSpot reviewer Dima Z., Director at Irangers International Inc., mentions, “The most useful feature of this solution is Cloud Control, which allows me to schedule cloud uploads.”

    Syed H., Lead Cloud Security Practice at Vincacyber, states, "I have found the most useful features to be the Web Secure Gateway, CASB, infrastructural service scanning, and Zero Trust."

    Sample Customers
    UNC-Charlotte
    NetApp, Genomic Health, Caterpillar, Apollo, Pandora, Continental Resources, Fractal, infinera, Tesla
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company20%
    Financial Services Firm10%
    Manufacturing Company10%
    Government6%
    REVIEWERS
    Financial Services Firm33%
    Healthcare Company22%
    University11%
    Non Profit11%
    VISITORS READING REVIEWS
    Computer Software Company15%
    Financial Services Firm11%
    Government10%
    Manufacturing Company8%
    REVIEWERS
    Computer Software Company24%
    Manufacturing Company24%
    Financial Services Firm14%
    Security Firm10%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Financial Services Firm15%
    Manufacturing Company8%
    Insurance Company5%
    Company Size
    VISITORS READING REVIEWS
    Small Business22%
    Midsize Enterprise16%
    Large Enterprise62%
    REVIEWERS
    Small Business33%
    Large Enterprise67%
    VISITORS READING REVIEWS
    Small Business23%
    Midsize Enterprise17%
    Large Enterprise59%
    REVIEWERS
    Small Business39%
    Midsize Enterprise18%
    Large Enterprise42%
    VISITORS READING REVIEWS
    Small Business21%
    Midsize Enterprise13%
    Large Enterprise66%
    Buyer's Guide
    Forcepoint ONE vs. Netskope
    March 2024
    Find out what your peers are saying about Forcepoint ONE vs. Netskope and other solutions. Updated: March 2024.
    768,578 professionals have used our research since 2012.

    Forcepoint ONE is ranked 8th in Cloud Access Security Brokers (CASB) with 10 reviews while Netskope is ranked 4th in Cloud Access Security Brokers (CASB) with 35 reviews. Forcepoint ONE is rated 8.4, while Netskope is rated 8.4. The top reviewer of Forcepoint ONE writes "Gives us another layer of protection when it comes to end users; an extra set of eyes and ears". On the other hand, the top reviewer of Netskope writes "Network proxy that provides visibility during deployment and allows you to control PII". Forcepoint ONE is most compared with Microsoft Defender for Cloud Apps, Prisma Access by Palo Alto Networks, Forcepoint Secure Web Gateway, Cisco ISE (Identity Services Engine) and Zscaler Internet Access, whereas Netskope is most compared with Prisma Access by Palo Alto Networks, Zscaler Internet Access, Microsoft Defender for Cloud Apps, Cisco Umbrella and Axis Security. See our Forcepoint ONE vs. Netskope report.

    See our list of best Cloud Access Security Brokers (CASB) vendors and best Secure Access Service Edge (SASE) vendors.

    We monitor all Cloud Access Security Brokers (CASB) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.