Forcepoint CASB Primary Use Case
We are security-centered and security-conscious. It's more of a security thing for us, however, there are other environments that are more in compliance.
EO
reviewer988044
Regional Solutions Manager at a tech services company with 11-50 employees
We use the solution to detect the logins from specific geolocations. We are able to detect malware when it comes to logins around our cloud services. If you have about three failed attempts, it deactivates your accounts and the administrator has to reinstate you to log in.
We have specified a list of countries, which we would and wouldn’t accept logins from. Once we have the geolocation policy set up, logins from the blacklisted countries get dropped. It gives us the complete capability to have a bit of control over the actions of our users. Like, we can see what our users are doing with the cloud applications. It also gives us the capability to scan and see Shadow IT applications our users are using as transaction applications. So, it serves its purpose.
View full review »We use Forcepoint for endpoint security. We profile for endpoint security devices such as laptops, and we configure different types of user groups for it.
View full review »Buyer's Guide
Forcepoint CASB
March 2024
Learn what your peers think about Forcepoint CASB. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.
DB
reviewer1624227
Professional Services Coordinator at a tech vendor with 11-50 employees
We primarily use the solution to protect data going out of cloud applications.
View full review »AB
reviewer1462065
Chief Technology Officer at a tech services company with 11-50 employees
We provide solutions to our consumers.
View full review »Buyer's Guide
Forcepoint CASB
March 2024
Learn what your peers think about Forcepoint CASB. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.