How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
We had planned on using this product as our multi-tenant firewall. After one year, we stopped using it because there was a problem with supporting some of the protocols.
We use it for a government network, here in Fiji.
Our primary uses for Forcepoint are internet access, filtering, and intruder detection. We also use it for file sharing.
Forcepoint makes up part of our security solution.
We just use this firewall for security in terms of network access.
Our customers use Forcepoint like a cluster, which is standby active and passive. They also use it for the perimeter firewall, so it's on-premises. The primary use case for this solution is when a customer asks for something that does automatic optimization, as well as security at the same time. It also has high performance capabilities, including enabling the SSL decryption feature. I recommend Forcepoint for these customers. If the customer has another solution for deep packet inspection of SSL encrypted traffic, I recommend Palo Alto, because they already have a solution for deep packet inspection for the kind of traffic in the network. From my point of view, at this point they do not need Forcepoint, so I would recommend Palo Alto.
Our primary use case for this solution is as a perimeter between our internal and external networks. It is a critical security firewall. We have an on-premises deployment.
I work for a distribution company. We implement around 2,300 firewalls in Egypt for schools. We use the licenses to manage all these firewalls together and push policies for the firewall. We use it for security to restrict some rules for accessing the internet for students.