TrustRadius: an HG Insights company

Proofpoint Email Protection

Score8.1 out of 10

225 Reviews and Ratings

What is Proofpoint Email Protection?

Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities ensure business communications can continue as normal in the event of an email outage.
With Proofpoint's Email Protection, you can protect your people, data, and brand from today’s threats with:
  • The ability to detect BEC or malware-free threats using our machine learning impostor classifier (Stateful Composite Scoring Service)
  • Nearly unlimited email routing capabilities utilizing our advanced email firewall.
  • Robust reporting and email tracking/tracing using Smart Search.
  • TAP, DLP and Encryption built into the same console providing a single pain of glass for management purposes.
  • Unwanted email management that allows users to decide which emails they would like to see in their inbox.

Top Performing Features

  • Anti-malware

    Anti-malware is a type of software program designed to prevent, detect and remove malicious software

    Category average: 8.8

  • End-to-End Encryption

    In end-to-end encryption the data is encrypted on the sender's system or device and only the recipient is able to decrypt it

    Category average: 8.2

  • Threat Detection

    Threat protection defend against sophisticated malware or hacking-based attacks targeting sensitive data.

    Category average: 8.5

Areas for Improvement

  • Customizability

    Customizing email security gateways can improve detection capabilities

    Category average: 7.8

  • Sandboxing

    Sandboxing is a software management strategy that isolates applications from critical system resources and other programs providing an extra layer of security

    Category average: 7.5

  • Data Loss Protection

    A set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

    Category average: 7.7