TrustRadius: an HG Insights company

Forcepoint Insider Threat

Score8.8 out of 10

3 Reviews and Ratings

What is Forcepoint Insider Threat?

Forcepoint Insider Threat is a security analytics tool for, searching, detecting and mitigating malicious or policy-violating employee behavior.

Insider can't be threat anymore with Forcepoint

Use Cases and Deployment Scope

We need to stop employees from sharing critical data within and outside the organization [especially] by email and USBs. And restrict them to print [sensitive] information like employee info, bank details, and any other details which relate to personal category. On [the] IT side we [don't] people to share keys and codes outside the organization.

Pros

  • Loss of data through Email
  • Copy of sensitive data
  • Sharing of data at all means
  • Printscreen restrictions
  • Printing restrictions

Cons

  • Visualization of data
  • Options are hard to find
  • Integration with Active directory

Most Important Features

  • Email monitoring including corporate and others like hotmail, gmail etc.
  • Data classification
  • Rule based protection

Return on Investment

  • Licenses are bundle up.
  • User based licensing.
  • Renewal cost is almost same as purchasing cost.

Alternatives Considered

Trend Micro Apex One (formerly OfficeScan), Symantec Advanced Threat Protection and Forcepoint Data Loss Prevention

Other Software Used

Veritas NetBackup, Netwrix Auditor, Veritas NetBackup Appliance

Single product that protects your data against threats from within

Use Cases and Deployment Scope

Forcepoint Insider Threat gives us visibility into computer users' early behavior and helps to stop data theft and loss by detecting suspicious activity whether intentional or accidental and preventing either the hijacked system, the rogue insider or just the user who makes mistakes and ensuring that valuable data is not compromised.

Pros

  • Establishment of normal user behavior and early indication of a potential risk when a user starts to stray from normal activity.
  • Automatically identify the riskiest user.
  • Provides context as a prove to investigation.

Cons

  • Forcepoint Insider Threat functionality meets our needs.
  • No room for improvement.

Most Important Features

  • Offers video recording and playbacks.
  • An intuitive way to identify the riskiest user.
  • Fully integration with Forcepoint DLP for smarter decision making.

Return on Investment

  • Saves time and effort to automatic identification of riskiest user.
  • Integrated enterprise-wide system and no need to buy a number of independent software.
  • Helps free our employee to focus on high priority task and improve efficiency.

Alternatives Considered

Netwrix Auditor and BetterCloud

Other Software Used

IBM Cloudant