Abnormal Security vs. Proofpoint Targeted Attack Protection (TAP)

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Abnormal Security
Score 9.5 out of 10
N/A
Abnormal Security, headquartered in San Francisco, offers a secure email gateway to that protects Microsoft 365 and Google Workspace accounts with AI threat detection. The solution is designed to prevent phishing and scams, high-level account impersonation, or supply chain attacks (i.e. invoice fraud).N/A
Proofpoint Targeted Attack Protection (TAP)
Score 9.1 out of 10
N/A
Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and credential-stealing phishing techniques to obtain sensitive information. TAP seamlessly integrates with the Proofpoint secure email gateway (Proofpoint Email Protection) to deliver best…N/A
Pricing
Abnormal SecurityProofpoint Targeted Attack Protection (TAP)
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Abnormal SecurityProofpoint Targeted Attack Protection (TAP)
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional DetailsContact vendor for pricing information.—
More Pricing Information
Community Pulse
Abnormal SecurityProofpoint Targeted Attack Protection (TAP)
Considered Both Products
Abnormal Security

No answer on this topic

Proofpoint Targeted Attack Protection (TAP)
Chose Proofpoint Targeted Attack Protection (TAP)
While both Abnormal Security and Proofpoint Targeted Attack Protection are email-based security applications, they each have their specific strengths. Abnormal is a great "first line of defense" with its machine learning capabilities and proactively blocking malicious or spam …
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Features
Abnormal SecurityProofpoint Targeted Attack Protection (TAP)
Secure Email Gateway
Comparison of Secure Email Gateway features of Product A and Product B
Abnormal Security
10.0
1 Ratings
18% above category average
Proofpoint Targeted Attack Protection (TAP)
-
Ratings
Customizability10.01 Ratings00 Ratings
Threat Detection10.01 Ratings00 Ratings
Management Tools10.01 Ratings00 Ratings
Best Alternatives
Abnormal SecurityProofpoint Targeted Attack Protection (TAP)
Small Businesses
Zoho Mail
Zoho Mail
Score 9.2 out of 10
Sophos Email
Sophos Email
Score 8.2 out of 10
Medium-sized Companies
Avanan
Avanan
Score 9.2 out of 10
Avanan
Avanan
Score 9.2 out of 10
Enterprises
Cisco Cloud Email Security
Cisco Cloud Email Security
Score 9.3 out of 10
Avanan
Avanan
Score 9.2 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Abnormal SecurityProofpoint Targeted Attack Protection (TAP)
Likelihood to Recommend
10.0
(1 ratings)
9.0
(43 ratings)
Likelihood to Renew
-
(0 ratings)
5.3
(3 ratings)
Usability
-
(0 ratings)
9.0
(6 ratings)
Support Rating
-
(0 ratings)
9.0
(4 ratings)
Implementation Rating
-
(0 ratings)
9.9
(2 ratings)
User Testimonials
Abnormal SecurityProofpoint Targeted Attack Protection (TAP)
Likelihood to Recommend
Abnormal Security
Another local organization was compromised, and we were one of the targets of their further attempts. We were 100% protected because the behavioral analysis protected us, but also allowed me to contact that organization and report their compromise. This has actually happened more than one time since going live.
Read full review
Proofpoint
Proofpoint Targeted Attack Protection is a great security application for notifying our team about when our users click on malicious links. It provides a good explanation of the attack scenario, including the Sender, Subject, as well as other users that this attack has been sent to. It is also very useful in helping provide metrics on what types of attacks have been sent to the organization historically.
Read full review
Pros
Abnormal Security
  • Spam filtering...we have been able to turn our spam sensitivity down on Exchange allowing more legitimate messages through to user inboxes.
  • Malicious email filtering...we experienced several successful phishing attacks over the past year. Abnormal Security has prevented hundreds of individual campaigns since going live in August '22. I cannot thank them enough!
  • Automated response for reported emails...my team is small and we do not have enough hours in a day to review and respond to each reported email. Abnormal Security performs additional analysis on those reports and automatically responds for us. If the message is spam or malicious, copies of those emails are looked for throughout the server and deleted.
Read full review
Proofpoint
  • Impostor email detection is a fantastic feature and works very well.
  • The sandbox feature helps to ensure confidence that their evaluation of the email threat is valid.
  • Easy to use (and understand) dashboard make identifying and managing email threats a breeze.
Read full review
Cons
Abnormal Security
  • None so far, I have been extremely happy with their service.
Read full review
Proofpoint
  • Their admin web GUI is cumbersome and unclear in many ways. The learning curve is steep so you have to stay up on things yourself whenever a new feature or service is added.
  • They sometimes add a feature to their toolbox without informing their customers. This is true even when the feature added does not cost extra.
Read full review
Likelihood to Renew
Abnormal Security
No answers on this topic
Proofpoint
Not my decision, but I have made it very clear this product does not perform. I have emails from our users on how bad it is after switching to it.
Read full review
Usability
Abnormal Security
No answers on this topic
Proofpoint
The interface is simple to use but still contains the information needed to conduct thorough investigations. If you own licenses for other Proofpoint tools, Proofpoint Targeted Attack Protection is easily accessible from those applications. The ability to sandbox URLs within the TAP interface is a great feature as well. The overall performance of the GUI is seamless, especially if enabled with your organization's SSO.
Read full review
Support Rating
Abnormal Security
No answers on this topic
Proofpoint
Generally have had good response and resolution time with knowledgeable technicians, and if needed the ticket is moved to someone with more expertise to better address the issue. Have used the ticketing portal, phone, as well as the beta chat feature (permanent please!)
Read full review
Implementation Rating
Abnormal Security
No answers on this topic
Proofpoint
Proofpoint managed the installation and made it very simple. We had a dedicated installation engineer who checked in on use periodically after go-live to ensure that there were no issue.
Read full review
Alternatives Considered
Abnormal Security
Abnormal Security blocks malicious emails that both PhishER and Cisco Secure Email Threat Defense miss. One thing that PhishER does have is the ability to flip a malicious message into a user education phishing email. That's cool, but I think we can just copy/paste the same info into a custom campaign.
Read full review
Proofpoint
This is the first product of its kind that I've used personally. The last 3 companies that I worked for also used Proofpoint, which includes Proofpoint Targeted Attack Protection, so I don't have a way to really compare it. I have seen that it is a leader in the industry.
Read full review
Return on Investment
Abnormal Security
  • Preventing compromises that have historically led to payroll or accounts payable threats.
Read full review
Proofpoint
  • Saves IT time when an attack is successful and isn't reported in a timely manner or at all until damages are done. IT has to spend less time and effort because we are able to stop it before it spreads.
  • Protecting business resources and assets is a huge positive impact. TAP allows us to better protect our business and information within.
  • The only negative thing is that it doesn't automatically handle these attacks - but that is what TRAP is for! I wish Proofpoint bundled TAP and TRAP.
Read full review
ScreenShots

Abnormal Security Screenshots

Screenshot of Abnormal Security