PRODUCT_PG_CASB Created with Sketch.

Cloud Access Security Broker

Complete security for all cloud applications. Period.

Complete Visibility

Complete visibility into shadow IT

Identify and categorize cloud apps to access risk and pinpoint which services to allow and monitor with Forcepoint Cloud Access Security Broker (CASB).

Behavioral Fingerprints

Prevent compromised accounts

Stop bad actors from accessing cloud application data. Use leading machine learning and UEBA capabilities to establish behavioral fingerprints for advanced risk calculation.

Mobile Access

Secure mobile access to cloud apps

Apply unique access and security policies on a per-device basis by easily distinguishing between managed and unmanaged (BYOD) devices.

Leakage Prevention

Industry-leading data loss prevention

Forcepoint DLP integration prevents cloud application data leakage without redefining policies.

Admin Control

Better control of your cloud app admin

Delegate administrative privileges for high-risk activities such as making global access changes and enabling multi-factor authentication of admin and privileged user permissions.

External Sharing

Control sharing of sensitive files

Enable productive collaboration with third parties in SaaS environments without accidentally exposing critical files that contain sensitive data such as PII, financial records, and protected IP with CASB.

Stop Ransomware

Intelligent threat detection

Use deep inspection to automatically detect and block malicious executables from being stored in cloud applications with Advanced Malware Detection.

Quick Security

Quick and easy security for cloud apps

Secure any cloud application (SaaS, PaaS, IaaS, or homegrown) without waiting for us, whether you are using APIs or inline (proxy) with Cloud Access Security Broker.

Location Access

Location-based access controls

Enable access restrictions based on user/cloud service location to help comply with data regulations with CASB.

Comprehensive, award-winning cloud security


Cloud apps not protected by Forcepoint CASB


of activities monitored per cloud app

Forcepoint CASB eliminates security blindspots
Security for all cloud applications

Forcepoint CASB's unique proxy analysis engine gathers information from a broad set of activities to build mapping files for cloud apps, enabling support for any cloud app.

Cloud application discovery

Utilize existing log files to automate the discovery and categorization of cloud applications within your enterprise with Forcepoint Cloud Access Security Broker.

Cloud application risk scoring

Categorize the overall risk for each cloud application based on regulatory requirements, industry certifications, or your own internal benchmarks.

Advanced and customizable risk metrics

Establish detailed cloud application risk posture metrics and information for each application to strengthen your overall security posture, with the option to create customizable weightings.

Automated app catalog and risk updates

Maintain your cloud application security posture with automatic updates to cloud application catalog and changes in risk properties as soon as they become available.

Data classification

Catalog and identify sensitive or regulated data, including file sharing permissions and stored in file-sync services to ensure compliance with regulations like PCI, SOX, HIPAA.

User governance

Quickly identify dormant/orphaned accounts and external users to reduce operational costs and minimize associated security threats.

Application governance

Benchmark your cloud application security configurations against industry best practices and regulatory requirements (PCI DSS, NIST, HIPAA, etc.) to identify security and compliance gaps.

Integrated remediation workflow

Utilize a unique built-in organizational workflow to assign and complete risk mitigation tasks via Forcepoint CASB or through integration with third-party ticketing systems.

Real-time activity monitoring/analytics

Understand potential exposure with real-time activity monitoring and analytics by user (regular, privileged users, admins), group, location, device, application action, and more.

Automatic anomaly detection

Forcepoint CASB's unique cloud-based UEBA continuously monitors user behavior to detect anomalous activity, so you can quickly identify and stop high-risk insider or external attacks.

Data loss prevention

Data classification at rest with real-time content inspection and action for data residing in cloud applications.

Device and location-based access control

Enable unique policies for managed and unmanaged devices, whether they're on browsers or rich mobile applications. Implement access restrictions based on the location of the user or cloud service.

Integration with third-party solutions

Forcepoint CASB security offers integration with leading SIEM, Identity Access Management, and Mobile Device Management solutions, providing a seamless holistic solution to protect cloud applications.

One CASB platform. Multiple cloud applications. Multiple integrations. Better results.

Eliminate security blind spots by following the rhythm of your people and flow of your data. Forcepoint CASB can support any cloud application with multiple key partner integrations.





Q1 Labs

Q1 Labs



Ping Identity

Ping Identity





Office 365

Office 365



Microsoft Azure Information Protection

Microsoft Azure Information Protection

G-Suite (Google Drive)

G-Suite (Google Drive)




Forcepoint is a strong CASB security contender with its unique ability to support any cloud app

Trusted by Thousands of Customers Worldwide


"Excellent solution delivering the best flexibility in the market."

System Administrator, Energy and Utilities
Submitted to Gartner Peer Insights on Jan 25, 2019

"CASB implementation is a great addition to protecting data and highlighting Shadow IT."

Technical Architect, Miscellaneous Industry
Submitted to Gartner Peer Insights on Aug 9, 2019

"It has helped to speed up incident analysis and response. As an analyst working in our SOC, it has helped me speed up analysis of incidents that are related to data leaving or entering our network. It has helped me identify end users quickly as we use login names that do not match employee names. It has also helped us with visibility on what data is stored on the cloud and our employee behavior."

IT Professional, State & Local Government
Submitted to TechValidate TVID: 89D-2B6-A45 on Jun 26, 2018