Cloudflare Zero Trust Services vs. Proofpoint Targeted Attack Protection (TAP)

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Cloudflare Zero Trust Services
Score 8.8 out of 10
N/A
Cloudflare's Zero Trust Network Access (ZTNA) technologies create secure boundaries around applications. When resources are protected with ZTNA, users are only allowed to access resources after verifying the identity, context, and policy adherence of each specific request. Cloudflare's Zero-Trust-as-a-Service model enables users to deploy access controls on the company's instant-on cloud platform, backed by Cloudflare's global network.N/A
Proofpoint Targeted Attack Protection (TAP)
Score 8.8 out of 10
N/A
Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and credential-stealing phishing techniques to obtain sensitive information. TAP seamlessly integrates with the Proofpoint secure email gateway (Proofpoint Email Protection) to deliver best…N/A
Pricing
Cloudflare Zero Trust ServicesProofpoint Targeted Attack Protection (TAP)
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Cloudflare Zero Trust ServicesProofpoint Targeted Attack Protection (TAP)
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Cloudflare Zero Trust ServicesProofpoint Targeted Attack Protection (TAP)
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Best Alternatives
Cloudflare Zero Trust ServicesProofpoint Targeted Attack Protection (TAP)
Small Businesses
ThreatLocker
ThreatLocker
Score 9.0 out of 10
Webroot Email Security Powered by Zix
Webroot Email Security Powered by Zix
Score 9.0 out of 10
Medium-sized Companies
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.6 out of 10
Webroot Email Security Powered by Zix
Webroot Email Security Powered by Zix
Score 9.0 out of 10
Enterprises
Palo Alto Networks Prisma Access
Palo Alto Networks Prisma Access
Score 8.6 out of 10
Webroot Email Security Powered by Zix
Webroot Email Security Powered by Zix
Score 9.0 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Cloudflare Zero Trust ServicesProofpoint Targeted Attack Protection (TAP)
Likelihood to Recommend
9.6
(4 ratings)
9.0
(42 ratings)
Likelihood to Renew
-
(0 ratings)
5.3
(3 ratings)
Usability
-
(0 ratings)
9.0
(5 ratings)
Support Rating
9.1
(3 ratings)
9.0
(4 ratings)
Implementation Rating
-
(0 ratings)
9.9
(2 ratings)
User Testimonials
Cloudflare Zero Trust ServicesProofpoint Targeted Attack Protection (TAP)
Likelihood to Recommend
Cloudflare
For example, Cloudflare is a very good solution for ZTNA implementation. Cloudflare has Warp for propagating Gateway rules and checking device posture. Browser Isolation gives you more abilities to use internet resources without any restrictions and at the same time not put the company at risk. For example, if there is no DLP solution in place blocking the printing function can partly protect the company's sensitive data from intentional or intentional leakage through the online forms. A similar approach protects the end-user device from Zero-day threats and malicious software code. Moreover, Remote Browser Isolation technology protects not only the user's device but also the user himself from possible phishing attacks - for example, even if the user enters his username and password on the phishing website, bank card issuers, or other personal or confidential data, data will not go beyond the isolated cloud environment. Cloudflare Access gives company administrators a great opportunity to implement role-based access policies and make effect segmentation and diversification of company network groups.
Read full review
Proofpoint
I think it is well suited for any organization. It truly gives good insight on the email campaigns that are hitting your company, as well as the people that are being targeted the most and also VIP users such as executives or even other people in IT, cyber, or administrators.
Read full review
Pros
Cloudflare
  • Block access to known bad, risky, or unwanted destinations at the DNS or HTTP level.
  • Excellent protection for remote users.
  • Best in class browser isolation techniques.
Read full review
Proofpoint
  • Impostor email detection is a fantastic feature and works very well.
  • The sandbox feature helps to ensure confidence that their evaluation of the email threat is valid.
  • Easy to use (and understand) dashboard make identifying and managing email threats a breeze.
Read full review
Cons
Cloudflare
  • Very API [oriented] which is fine, but the GUI is sometimes inconsistent
Read full review
Proofpoint
  • Their admin web GUI is cumbersome and unclear in many ways. The learning curve is steep so you have to stay up on things yourself whenever a new feature or service is added.
  • They sometimes add a feature to their toolbox without informing their customers. This is true even when the feature added does not cost extra.
Read full review
Likelihood to Renew
Cloudflare
No answers on this topic
Proofpoint
Not my decision, but I have made it very clear this product does not perform. I have emails from our users on how bad it is after switching to it.
Read full review
Usability
Cloudflare
No answers on this topic
Proofpoint
Simple to configure and very straightforward dashboard. Within days of implementation, we were using the dashboard to reduce our response time.
Read full review
Support Rating
Cloudflare
Good chat support from the portal for basic questions and minor issues. The enterprise support line is provided as well.
Read full review
Proofpoint
Generally have had good response and resolution time with knowledgeable technicians, and if needed the ticket is moved to someone with more expertise to better address the issue. Have used the ticketing portal, phone, as well as the beta chat feature (permanent please!)
Read full review
Implementation Rating
Cloudflare
No answers on this topic
Proofpoint
Proofpoint managed the installation and made it very simple. We had a dedicated installation engineer who checked in on use periodically after go-live to ensure that there were no issue.
Read full review
Alternatives Considered
Cloudflare
As long as all Cloudflare products and services rely on anycast technology, in a complex approach Cloudflare is faster and more relevant for cloud applications. The balance between security and performance is fully established. Also, Cloudflare has quite a good stack for API connection protection, like the API Shield example, which makes it more effective compared to F5 for example. Warp as a ZTNA agent gives better visibility and device posture information than FortiClient does.
Read full review
Proofpoint
Besides using the default native protection in the email product itself, we have not looked closely at other email security products. But going with Proofpoint is the right choice. When our leadership team has concerns about malware attacks, we just tell them that we have the security in place using Proofpoint Targeted Attack Protection for Email. And we don't just tell them, we provide them the reports coming out of Proofpoint which show the threats being blocked and the metrics.
Read full review
Return on Investment
Cloudflare
  • Complete solution in case of using with Cloudflare Access.
  • No need of maintenance.
  • No skilled staff and trainings required.
Read full review
Proofpoint
  • Saves IT time when an attack is successful and isn't reported in a timely manner or at all until damages are done. IT has to spend less time and effort because we are able to stop it before it spreads.
  • Protecting business resources and assets is a huge positive impact. TAP allows us to better protect our business and information within.
  • The only negative thing is that it doesn't automatically handle these attacks - but that is what TRAP is for! I wish Proofpoint bundled TAP and TRAP.
Read full review
ScreenShots