TrustRadius
https://media.trustradius.com/product-logos/F0/xp/X1RDAHLZ8KLM.JPEGProofpoint email security, everything you need and more!Proofpoint is being used across our sister companies and we have an admin in each of the countries. It is our main email security tool and is used by all of our users. We were in need of a product that could handle higher volumes of email traffic and Proofpoint regularly features as one of the top email security products. It addresses many of the issues we were having with email security, some we didn't even realize we had. It has helped us get a very detailed overview of our email. We have extremely granular control of our inbound and outbound email.,Granular control of inbound and outbound email. The rules that can be configured for mail are extremely impressive. An example is that you could configure rules so that if your CEO sends an email that cannot create a TLS link with the receiving MTA, then it will reinject the mail into the queue and send it again with encryption configured. To ensure emails are never sent over plain text. This is but one of the examples. Spam detection is amazing. Proofpoint can detect and stop around 99% of spam and this is shown in the reporting available. End-user services are fantastic and cut down on admin work greatly. End-users can create their own filters, release their own mail and also get end-user digests so they can see all mail that has been delivered to them.,The pricing is high and there are many licenses for things I feel should be part of other products. The UI is slightly dated and has a lot of room for improvement. The separate products should have one pane of glass for administration. Currently, if you own several of the products it feels quite disjointed when using them.,10,Our internal pen-test has been thwarted completely thanks to proofpoint, all email attack vectors were unsuccessful. We now have a better overview of our email and have successfully implemented DMARC. This is largely due to proofpoint. We are able to see a vast amount of reporting & logging which was previously not available.,This is where Proofpoint has been excellent for our organization. We have passed internal & external pen tests thanks to Proofpoint correctly identifying threats and viruses being sent in. Many threats we have been unaware of have been completely thwarted thanks to the product. Spam being delivered is significantly reduced thanks to Proofpoint as well, which is something that our end users always appreciate!,Yes, this has been extremely beneficial to our company as a lot of the threats we see are from impostor emails. Proofpoint can learn from the traffic it sees, not just from us but from all of Proofpoint's customers and it can find where our domains are being abused.,,Cisco ASA, Splunk Cloud, Proofpoint Advanced Threat ProtectionProofPoint has proven their value and saved us from thousands of attacksWe use Proofpoint email protection to filter all inbound and outbound email for the corporation worldwide. As opposed to our previous mail filter solution, Proofpoint is able to stop all malware, viruses, and nearly all spam. Additionally, we heavily use the impostor detection feature. Our executives are very commonly impersonated in an attempt to gain gift cards or other goods. Proofpoint has been able to drastically reduce these attacks.,Impostor detection Virus detection Malware prevention,The cost is significantly higher than other similar products on the market. The administrative interface can be difficult to use. There is no search function and it can be browser-specific.,8,We have had far fewer incidents of fraudulent solicitation of payments, resulting in fewer payouts. With features we didn't have before, we are able to implement new workflows and processes without additional third-party tools.,Due to the reduced incidents, we have fewer virus/malware infections. This means our Security Team can focus on new projects rather than remediation. In addition, we have had no ransomware attacks make it through Proofpoint. As a result, we have not had to pay any attacker to regain access to our data.,The machine learning feature of ProofPoint has been beneficial in attack detection and prevention. We are able to submit false positives and negatives via the administrative console. These are processed automatically and help to train the system to detect (or ignore) similar messages going forward. There can be some delay in prevention, which is the only downside.,Cisco Managed Security Services and Symantec Messaging Gateway,Exclaimer Cloud - Signatures for Office 365, Exclaimer Signature Manager Exchange EditionProofpoint is pretty much foolproofWe use Proofpoint Email Protection across our whole company to protect our users from getting malware, viruses, spoofed emails, phishing emails, etc. We use Office 365 as our backend email system and it works seemlessly with it. Before getting Proofpoint Email Protection we used to get tons of phishing emails and spoofed emails but 99% of those have stopped since implementing it.,Can send daily emails to users showing what emails got caught in their individual spam quarantine Very extensive search engine to search for emails sent/received Easy to block or allow emails in the system,It seems there are too many options to let you block or allow emails. It is easy to do still but can be confusing as there are like 5 different places you can do it so maybe simply that somehow. Make an easy way to block email names vs their email address, for example if the email name says Joe Smith but the address says sweet1@hotmail.com when it should be joe.smith@yourcompany.com there should be an easy way to block that kind of email. When doing searches for emails, the from address a lot of times looks weird, different than what you searched for. For example you searched for an email from bobsmith@gmail.com but the from field in the search results may say emailsender101138383093@email.server.number2113.org which is confusing.,9,It has pretty much stopped all spoofed emails, don't think we have seen 1 spoof since implementing It helps increase worker productivity since it cuts way down on junk email thus not wasting as much time reading it It has opened our eyes to the sheer amount of email threats out there,We definitely have reduced the number of threats since deploying Proofpoint Email Protection. Before implementing we were just using transport rules in Office 365. While that mostly worked for really threatening messages we still got a ton of spoofed emails as well as just junk email in general. Sine implementing I haven't seen 1 spoofed email and we see no virus emails get through and just the amount of junk emails has decreased significantly.,The imposter attacks have basically stopped since implemention so the machine learning works!,,BMC FootPrints, Dameware Remote Support, Microsoft Office 365My Proofpoint ReviewIt has been used across the whole organization to protect us against spam and unwanted suspicious emails from the internet.,It identified the spam or mails which are malware, then classified them as quarantined or discarded. It helps the end-user to allow/block externals users. Users can add a sender to a safe list or block list. It provides the end-user the option to release emails that are blocked.,It would be good to have a stand-alone application instead of a web-based portal for the admin console. It should ask for confirmation from admin/user before save or delete operations like Microsoft applications. Admin should be able to open a ticket via the same portal, like the Office 365 portal.,9,Email-based attacks are common nowadays. It affects the entire organization so having the Proofpoint Protection layer between org and external internet is always good. Secure email is essential for every business. Malware most commonly reaches businesses through email. As attacks become more sophisticated the business could be vulnerable. A malware attack means more than just a security risk. If attacked, businesses run the risk of lost intellectual property, productivity, business reputation, time and money. So investing in email protection software like Proofpoint is always good for business. It would be a bit of a burden to a small business to have third-party email protection software. but it is worth it.,Yes, our org has benefited by having the Proofpoint layer, it is an international organization so email communication very important. In the logs, we can see thousands of spam emails that have been blocked and rejected. Also, blocked spoofed senders.,Yes, obviously the company has benefited even though we have Office 365 mailbox communication. Still, many of us truly believe proof-point makes great products when it comes to email protection.,,Microsoft Office 365, Microsoft Exchange, MailsDaddy PST to Office 365 Migration ToolI proof the Point.Proofpoint is used throughout or organization for email protection, DLP, encryption.,Encryption DLP Anti-Malware,Spam filter,10,ease of management No overhead,The product has done good thing with protecting our email from spam and anti-malware, support is easy to get answers from and assistance when there is a problem. We have noticed with our in depth layering that very little does get past proofpoint and its protection system we would recommend this products to others.,Yes I believe we have benefited from machine learning. We have noticed over the years with the product that it identifies and catches most attacks. Which reduces the amount of time our staff need to take to administer the device and over all reduce the time needed for email protection and support.,Cisco Enterprise Network Security,Cisco 1000 Series Aggregation Services Routers (ASR 1000), Cisco 5000 Series Network Convergence System (NCS 5000), Cisco 800 Series Integrated Services Routers (ISR 800)Pro-Proofpoint!!We use Proofpoint Enterprise Email Filter, Tap and TRAP. Have had really good experience with Support and implementation and have seen really good results in protection. TRAP has came in handy as well, love it.,Prevents Phishing Rewrites bad URL links in emails SPAM,Admin User interface is ugly regular health checks up for your cuastomers send SWAG to guys that implemented it,9,Better detection Next gen level protection URL remitting Ransomware portection AntiPhish,Absolutely, from occasional serious incidents to none so far!,Less threats penetrating our network.,FireEye Security Suite,SentinelOne, SolarWinds Database Performance Analyzer, Tenable.sc (formerly SecurityCenter)Really not happy with Proofpoint or their customer serviceWe use it to filter spam. We aren’t using it for much more really and aren’t getting much value beyond that.,Stop spam That is literally it,Our users hate how they can’t see URLs in emails We don’t like that our users can’t release their own emails,1,It costs us a lot of money for a medium amount of value. We probably won’t be renewing once we move to O365 as we have a terrible vendor relationship with the company.,It’s hard to say. We get a lot of spam that gets through, particularly phishing emails. When we discussed this with our rep we needed to pay more for that feature.,I don’t believe we have this. I don’t think it’s on it we do, I don’t see any improvements over time in spam filtering.,Microsoft Office 365,Intermedia Email Plus, GoToMeeting, SlackProofpoint - A Real World ExampleProofpoint is used to protect the organization's e-mail system, along with other components. It helps protect customer information, to provide encryption, and provide TAP Real Time Protection to email.,TAP protects our board members against targeted spear phishing Prompt review of potential zero day email exploits Very intuitive GUI, that helps you find what you need, along with the metrics and reports needed.,Sometimes support does lag, on certain incidents. Not able to get direct phone support for a case. Need to wait for a call back. Proofpoint Online notice for potential Proofpoint Hosting issues lags when needed immediately. Changing of account managers seems to be happening a lot.,9,Proofpoint able to add zero day exploit definitions to all clients, once found TAP able to protect executive board members and highly valuable targeted employees Great reports to provide to auditors and examiners,We have seen a more holistic view of how our organization is targeted. We can drill down to email specifics, and see what is going on, and to submit to Proofpoint.,We have not seen any explicit benefit from this technology. Maybe there is some way for us to provide this information, so we can be more accurate in our review.,Forcepoint Email Security, Symantec Client Management Suite, Proofpoint Advanced Threat ProtectionProofpoint: Worth the investmentMy department uses Proofpoint Email Detection as a secondary email protection and logging solution. Other departments have access, but it is primarily used by the Information Security Office. The main problems it is used to solve is blocking spam and malicious emails, as well as monitoring user activity. It can also be helpful for determining if there is something wrong with our email service.,Extremely clear and detailed presentation of information. Effective filtering of unwanted messages. Great support: issues are resolved quickly and without mystery.,Not easy to use. There's a bit of a learning curve. Encryption functionality leaves a lot to be desired. We get a lot of redundant alerting because a secondary solution is blocking spam this fails to detect.,8,It has reduced time wasted responding to users who call to report spam and malicious messages. It has reduced the material cost of machines being infected with malware. It has reduced the financial impact of users who fell for wire transfer scams.,Our organization has benefited from a reduction in the number of threats since deploying Proofpoint Email Protection. The most significant attack vector in almost any company today is email. Even very sophisticated users can fall for a phishing message. The biggest benefit that we've gotten from this solution is being able to recognize the patterns of attack adversaries use and react to their tactics.,The machine learning capability has pros and cons. As far as we can tell, the machine learning functionality works by taking user input and altering the mail filtering based on what the users are saying. The problem with that is a small number of users can cause a false positive. This has been disruptive a handful of times in the past where legitimate mass emails have failed to arrive with a user.,G Suite, Sumo Logic, Duo SecurityA REAL solution for robust email securityWe use Proofpoint Email protection across our entire organization. Its primary use case is to defend against malicious emails including phishing and ransomware, for which it has done an absolutely outstanding job. Phishing was a huge risk and point of concern for our business, and since implementing Proofpoint, it is no longer a primary concern for our security team. The solution is mature, robust, and extremely effective. The reporting is clear and concise, and we provide this to the senior management team so that they can see the evidence of what the solution is protecting us from.,Rewriting of links in emails to send users through a proxy: extremely effective at blocking malicious links in emails Attachment sandboxing: attachments are "detonated" in a sandbox and analyzed Anti-Spam: extremely effective spam filtering Maturity: very mature and feature rich solution which can address a variety of needs,User interface could be modernized, though it is effective/well organized In some cases, there are small delays in the arrival of emails. Perhaps back-end performance could be upgraded for faster processing by Proofpoint,10,ROI is hard to measure, as it is primarily avoidance of risk but it significantly addresses this. Productivity is improved due to effective anti-spam.,Absolutely. The effect was very dramatic almost instantaneously. The Security team went from regularly following up on / investigating potential phishing attempts to this becoming an extremely rare exception. As custodians of very sensitive data within our company, this has provided significant comfort to the management team, knowing that one of the most common origins of data breaches has been risk-mitigated.,This is also an effective capability - email impostor scenarios were a significant problem for us prior to using Proofpoint. We used to do simulation exercises and training around this for our end users. Since Proofpoint, it is nearly impossible for us to even simulate email impostor attacks, let alone worry about them reaching our user base.,Forcepoint Email Security, Trustwave Secure Email Gateway and Mimecast Secure Email Gateway,Netskope, IBM QRadar, G Suite,8,NoA Simple and Effective Email Protection toolWe currently use Proofpoint Email Protection across our entire organization. After having this product for about 2 years and seeing how many threats it stops, I cannot see us not having it! I particularly love the granularity in being able to create very specific rules to ensure unwanted emails are blocked, while still allowing valid ones to be delivered. I can create rules based off of specific email headers, even "user-defined" headers. This is a fantastic product and we have always received prompt responses when we have engaged support.,Offers very granular rule creation for SPAM detection. Email Firewall rules allow you to outright stop emails before the even get to a mailbox. Ability to implement DMARC, DKIM, and SPF is great.,Would prefer a few more color choices for the dashboard (like a color picker rather than just preset colors). Want ability to resize columns in Email Protection and System tabs. Want additional fields available to filter by for the Firewall rules (such as Message headers).,10,The cost associated with some threats (such as successful fraudulent wire transfers) far outweigh the costs of the software. Since implementing Proofpoint, we can spend less time chasing down threats that have been received by our clients....thus saving us time (and money). It is hard to measure specific cost/ROI but perceived value is substantial.,We have seen a dramatic decrease in the number of successful phishing/malware messages since we have implemented Proofpoint Email Protection. Proofpoint stops literally thousands (maybe tens of thousands) of messages each month that would have been delivered. Not only does this keep us safer, but it also helps to increase productivity since our employees are not having to spend time reading/sorting through SPAM messages.,Yes, we benefit from the Impostor feature immensely. We regularly receive emails pretending to be from our executives, but the vast majority will get stopped by Proofpoint thanks to this feature. There have been a few instances in which we did get valid messages that were blocked, but we were able to add the exception (for the valid external addresses) to correct those issues.,,LogRhythm NextGen SIEM Platform, Cb DefenseProofpoint is fine, but not greatWe use Proofpoint Email Security for incoming, external e-mail in our organization, as our primary defense against spam and other security threats, and as a way to maintain e-mail continuity if our internal Exchange server is offline or otherwise unreachable. It prevents our users from getting flooded with unsolicited emails and phishing attacks, in most cases, which is extremely important.,Spam Filtering: Proofpoint does a very good job of blocking spam natively, and of course users and administrators can set up white lists and blacklists as needed to fine tune everything. There are several configuration options, but we have a quarantine digest sent to end users if it's possible but not confirmed spam. It can also be set to just stamp an email with a "spam" notice in the subject line and send directly, for anything that's suspected as spam. URL Filtering: Proofpoint re-writes URLs in emails so that, if a user clicks one, it takes them to a sort of proxy site that double-checks the URL. This means that even if a malicious email gets through, there's another check before a user could potentially download some harmful file from an attacker's website. E-Mail Continuity: Since email goes through Proofpoint before hitting our internal server, it can hold the e-mail in a queue in case our servers are unreachable. The mail then spools in once the servers are back, or users can log into Proofpoint from outside to check email.,URL Filtering: While this is a nice feature, it tends to obfuscate the URL in any readable way. Users are trained to hover over links to make sure they go where they say they're going to go, to check for anything suspicious as a security check. It's almost impossible to decipher the links once they've been rewritten by Proofpoint. User Setup: Although it's fairly simple to add in a user, it takes up to an hour for the email to that user to work, and before that time, they will bounce back as an invalid user. For some reason, Proofpoint only updates its internal lists at the top of the hour. User Spam Management: Since it's a third-party application, it does take a secondary login to manage white- and black-lists for users. This isn't a big deal for administrators on company-wide lists, but it's an extra, cumbersome step beyond just clicking a link for end users, which sometimes means they're not going to bother.,4,We rarely get malware through e-mail, so Proofpoint does its job there. Given the security landscape, that's not nothing. That saves IT a lot of time, money, and effort in managing manual lists or, worst case, cleaning up infections. We do still get spam, albeit less than we would if he had nothing in place. The digests are a good way to manage it, so users can see the email subjects and senders once or twice per day, and decide what to do with them all at once. That saves end users some time. The only way to blacklist a sender or domain is to log in to Proofpoint; you can't just flag an email for spam or click a link in the email to block it for the future. This takes more time, and so I would say it negatively impacts the RoI.,Microsoft Office 365, Mimecast Secure Email Gateway, Barracuda Email Security Service and WatchGuard Secure Email Gateway (XCS),Zix, Microsoft Exchange, Sophos Secure Web GatewayProofpoint for the win!This product is being used across the entire organization. All users who have a mailbox are also Proofpoint users. This currently solves our issue of excessive spam, gives users a quarantine/digest/whitelist/blacklist solution, and prevents e-mail viruses from reaching our environment.,This product is extremely configurable by an administrator. I feel like I have complete control over the product and its settings. Users have fine-grained control of their anti-spam threshold levels, whitelists, blacklists, and quarantine digest options. The appliances are extremely reliable. In 7 years of using Proofpoint, I have never seen an appliance crash or need to be rebooted for a reason other than a major config change or upgrade.,The product can be difficult to learn and master. Other comparable products are simpler to use and don't require as much time to master. Reviewing logs within the GUI is an awful experience. For example, Log Reports -> Log Viewer, the text window word-wraps at ~140 characters or so, even if you have room for over 300 characters. Combing through logs that have a short word-wrap threshold like that is painful. The cost of Proofpoint is higher than any other product I've piloted.,9,The ROI is off the charts. With our old provider, we spent too much time chasing malware that should have been caught with a reputable filter. We also spent too much time with our old provider on configuring options for end users that they weren't able to configure themselves, such as the digest frequency and anti-spam filter level settings. As a result, our administrators are able to focus their time on other tasks within our e-mail environment.,Yes! Our platform has indicated numerous phishing attempts as well as e-mails containing viruses which were blocked by Proofpoint. Due to our position as a large multinational publicly traded company, impersonation / spoofing attacks are also common attacks that we see which are routinely blocked. Overall, Proofpoint does an excellent job at protecting us from these threats.,We have benefited from this. Evaluating heuristics is key to preventing 0-day attacks and exploits from reaching us, and having that same approach with e-mail is no exception. Proofpoint has shown to be much better at implementing this than our previous anti-spam provider. The frequent updates to the anti-spam and anti-virus engines are important to us.,McAfee Email Gateway (Discontinued), Cisco IronPort Web Security Appliance and Symantec Email Security.cloudProofpoint gets the job doneWe use Proofpoint Email Protection to protect our whole organization from unsolicited and malicious emails that are flooding the Internet. Proofpoint Email Protection acts as a gate keeper to considerably reduce unnecessary and time-consuming noise from reaching our users email inboxes. Less clutter means more time to concentrate on our daily tasks.,Highly customizable filter modules Extensive search engine,UI design of the admin console could be improved Policy route management can be complex,9,Protects from email threatsProofpoint is the king of email securityIt's being used as an email gateway for the whole organization. It sits between the organizations internal network and the internet. All the emails that flow into the organization over the internet go through the Proofpoint gateway. Similarly, all the emails that go out of the organization are processed through Proofpoint mail gateway.,It's scanning engines are very good and detect most of the spam or bulk mails. The scanning engines can be fine-tuned per organization by updating the signature from the samples provided by the organization. The signature of the scanning engines are mostly up to date and are regularly updated for the new threats that are evolving. Proofpoint allows us to create and manage complex rules at the gateway level. It's very useful in large organizations with a huge network and complex requirements.,Proofpoint support is mostly helpful but the wait time for the support exec to attend the case and provide a meaningful resolution is quite long. Proofpoint never acknowledges or admits when some components of their products fail to deliver the desired results. Some components or features do not function as advertised like TRAP. Which has some issues due to full impersonation access.,9,Proofpoint effectively blocks millions of malicious emails trying to flow into our organization's network infrastructure. The tools like TAP, TRAP are great value adds for the product. There are some issues that the Proofpoint support or threat analytics team cannot explain, like the emails having spam score zero being detected as spam definite. TRAP needs to work as advertised.,I believe I am not the right person to answer this question as Proofpoint was a part of the organization when I joined the project. So no metrics to compare with the previous products.,The machine learning approach has very effectively identified the imposter attacks in the past. The engines are customized to an extent and are fine-tuned for an organization based on the samples provided which I find is a very important and useful feature. As different organizations deal with different dynamics and geographies. The threats faced by one organization cannot interpret the threats for another organization.,Cisco IronPort Web Security Appliance,Citrix Gateway (formerly NetScaler Unified Gateway), Skype for Business (formerly Lync), Webex MeetingsProofpoint reviewProofpoint is used by everyone in our organization as an external mail gateway with multiple appliances deployed globally. Proofpoint works as the shield protecting us from spam and other threats in emails received from third-party infrastructures. The product offers some transport rules and re-routing of emails based on various criteria. It also offers quarantine for end-users.,Spam control: the amount of spam removed from users' inboxes is massive. It provides easy deployment with virtual appliances. Reliable updates: we've never had a situation when we need to roll back the latest patch.,It's a somehow confusing web interface. The location of the buttons is not unified across multiple screens. We sometimes need to get through a few screens before identifying one with the required settings/parameter.,8,In terms of business impact, we've seen less spam and additional protection from the malware delivered to the user mailboxes. We have not had a case where we calculated ROI in money terms.,Yes, we did have benefits from Proofpoint when viruses were embedded into email messages, but Proofpoint did not stop very carefully crafted phishing messages that were using near-real-alike domain names and were directing employees to the third-party website.,I'm not sure if we've noticed this side of Proofpoint while using this product.,Proofpoint Email Protection reviewWe currently use Proofpoint Email Protection across our whole organization to filter out spam, bulk, viruses and unwanted email from ever getting to our end users.,Proofpoint Dynamic Reputation works really well for us. Approximately 82% of all of our inbound emails are blocked by Proofpoint. We can customize setting to allow it to work for us by allowing or blocking emails based on all types of criteria. We do not allow our end users to report SPAM so admins report SPAM and can also blacklist certain emails. We use Threat Response Auto Pull (TRAP) and a lot of the malicious emails are actually pulled from the user's mailbox before they ever know that they received them.,When reporting SPAM the default page settings are always loaded. I would like to be able to customize the startup screen for the folder that it starts in and the length of days to search for. Not all emails show up in the quarantine if they are below a certain size. We have emails that end-users request to be reported as SPAM but we are unable to in the user admin. We have to go between quarantine and Smart Search quite a bit when researching emails. Maybe this information could be combined in one screen.,10,We utilize it daily for blocking emails. It helps our end users by encrypting emails based on policies we have customized.,Yes, we have been using Proofpoint for several years but I can remember the time prior to Proofpoint and we would constantly have to remove malware from PCs. Proofpoint has been a lifesaver to help block a lot of the malicious emails before the end-user ever receives the emails.,I guess it has but not really sure how it works.,,Microsoft Exchange, Genesys PureConnectEnsign ProofPoint ReviewWe use ProofPoint to monitor and protect our inbound public emails and our outbound messages, monitoring for DLP, and other patient info. The product has been very reliable in the 6 years I have used the product. We are currently protecting over 10,000 mailboxes with a suite of ProofPoint tools, including TAPs and TRAPs. TAP has done a great job removing almost all traces of virus' getting through to our users, where we would be hit with multiple ransomware attacks in a months time to none since enrolling in the product. TRAP has also been a big help in reducing our phishing attacks. TRAP has made recalling suspect emails very easy and tracking when users click on suspect messages very simple. We get very detailed reporting and status reports of our users and that also helps us take action and preventative measures. The product suite has grown over my time as a customer and when I am asked online or by a fellow professional, I always recommend Proofpoint for email protection. My only complaint as a customer has been support response and that is only recently with the last couple support cases I have opened.,We receive very few incidents of SPAM in our user mailboxes. Looking at reports, you can see the service is doing its job. Coming up with innovative products, like TAP. This was a great addition to really clamp down on suspect attachments.,MY only gripe is response time to incident requests.,9,After adding the TAP product, we eliminated our ransomware incidents. This has eliminated the need for IT to tackle these incidents, restoring data and working with users to restore their lost work.,Yes. Spam, phishing incidents and virus attacks seem to have all but disappeared. And if not, we are able to quickly recall and modify our rules to resolve the problem from happening again.,We have. I can't give a detailed benefit other than it has improved the reliability for us.,Proofpoint to the rescueWe use Proofpoint Email Protection to relay both inbound and outbound email with email filtering, malware, and spam protection. This also adds visibility to the email traffic for the entire company.,Anti-spam filtering Malware protection Imposter rejection,Email firewall rules could be more straightforward. The admin interface could use more polishing.,10,Positive: increases productivity by eliminating almost all spam and malware. Protects the company IP by stopping malware. Protects the company reputation and other companies' assets by stopping potentially bad email from being sent out.,Very hard to answer. When things work well, such as we are not getting most of the "bad" mail, it is usually taken for granted. Had we had infections the loss of productivity, corrupted, lost or stolen data could have occurred.,While we have recently turned the feature on, we haven't performed efficiency studies yet.,,Cisco Firepower NGFW (formerly Sourcefire)Proofpoint customization capable of fitting into your business needsProofpoint Email Protection is deployed company-wide. It helped address multiple perspectives of secure mail customization, better email protection, and threat blocking/remediation. It also allowed us to bring our archiving into one product. Even though the archiving is a separate piece, it is at least under the same bill and better than what we had prior.,Allows for granular customization for the best fit for the company Administration is easy Threat protection is effective Analytics are nice Advanced protection features, such as impostor attacks, work well,It does miss some emails that should have been flagged. You look at the body of the email, the headers, etc. and wonder how it could have gotten through, but for the most part, it does a great job The email encryption seems to have some issues. Users will get random errors sometimes - like "Service unavailable" when clicking a link on an encrypted message or "the message has not reached the server or is no longer there", which can be particularly confusing to a recipient because they received an encrypted message and don't understand why this encrypted message that they just received is not in the portal Some of our encryption rules get skipped somehow. It would be nice to be able to determine why,9,While some pieces take some time trying to figure out, overall we can track things down much faster than before when using a combination of AppRiver and an Office 365 content search. This is huge, not only for our time, but also on the potential impact an attack can have. The Proofpoint Email Protection solution helps us to attain security certifications. The secure mail solution has frustrated a lot of clients. But no one likes going to a portal to retrieve mail, especially if it means remembering another password. This directly affects client satisfaction in working with us.,Yes. We've had a significantly lower number impostor attacks get through and a lot less "I've clicked the link, now we need to run a virus scan and have IT analyze my account, system and mail flow" due to less threats getting through. We haven't even tweaked the default scoring system yet. I'm considering making the scores a little more strict to get better results, but so far so good.,I can't speak to this one except that it started blocking my own personal email account as an impostor. Sadly, it wasn't catching the CEO type impostors as often as I'd have liked it to. But configuring this was easy and effective. But to address the machine learning aspect - it did work, just not on the email address I wanted it to. I have not done any analytics to see how many impostor emails get blocked vs. get through, however. So it may be more effective than I realized.,Barracuda Web Filter, Barracuda Web Application Firewall, AppRiver and Microsoft Office 365,Proofpoint Targeted Attack Protection for Email, Proofpoint Archiving and ComplianceProofpoint experience after 2 yearsWe are using one cloud Proofpoint Email Protection instance for the whole group of about 6 companies. We wanted a better product for email protection, as our previous product was very limited in customization and we felt the protection could be better. Though Proofpoint Email Protection is not cheap, it does the job so much better. Though the basic core functionality is just to block malicious/unwanted email, the risk of having such email being delivered warrants investing in a good product.,Email filtering: it does the core functionality really well. Reporting: the standard reports are numerous and are a big help for both administrators and management. I have not found a need for a custom report not on the default list yet. Manageability & easy web administration. Use of user digests so people can manage their own spamfolder and report false positives is efficient Customization via custom rules can be as specific as you want.,FN/FP reporting is a bit of a hassle. Though training options are good, you should actually follow some training to get the extra benefits of the product to manage it better. The admin GUI is not modern looking. Though a minor issue, it could help in administration.,8,Better protection for our users resulting in no ransomware issues for the last 2 years. We do a lot of bulk emailing (not going through the Proofpoint solution) but replies are being routed through Proofpoint. It requires the occasional tuning to have all those replies not end up blocked, but this might be because of the niche market we are in. Reporting some aggregate data to our users (easily generated) helps with security awareness about all the email threats and so helps the business.,Our previous product was not easy to manage. Proofpoint Email Protection does a far better job on that. Using the auto-pull option is a lifesaver, so when a malicious mail was later determined as such, it still can get removed from the user mailbox.,Although before we used Proofpoint Email Protection our users were still aware of these threats and didn't reply on them, having the email blocked in the first place is a far better solution, both for the user and for the administrators.,"This is the Email Protection Solution you are looking for." - O. KenobiProofpoint Email Protection is used across the entire organization. It is the cornerstone for our email security capabilities and ties into advanced email protection. Its functionality is discussed in detail in our security awareness program.,Blocks malicious email. Enables users to better identify suspicious email. Reduces the overall susceptibility of a security issue.,Is not fully integrated with newly acquired Wombat capabilities (e.g., two plug-ins vs. one). The email digest feature is not easily configurable and is not pretty or easy to use.,9,Reduces help desk call volume. Increases overall security awareness of employees. Requires minimal employee time for training.,Based on the few incidents we have had that are tracked back to their source, none have been through email. We are able to go into the dashboard and see the metrics regarding what has been blocked, who has been targeted, and how we compare. Assuming the numbers there are accurate, Proofpoint has been key to keeping us safe.,Cisco IronPort Web Security Appliance and Zix,Proofpoint Security Awareness Training (formerly Wombat Security), McAfee Advanced Threat Defense, BeyondTrust Endpoint Privilege Management, powered by PowerBroker and AvectoCustomized email protection for the enterpriseWe use this for our entire organization. Primary requirements for bringing it in was for data loss prevention (DLP) and to meet client and regulatory requirements. We also leverage this platform for e-mail protection against spam and phishing attacks.,SaaS service is very resilient and stable. Reporting and protection is good. Data loss prevention (DLP) is very flexible and accommodates our needs.. Custom rules, routing policy, and processing of email meeting a wide array of needs.,Additional/deeper integration with other security technology. Integration between Wombat (phishing campaign tool) and EM.,9,Decrease in security incidents due to effective attack protection. Central email relay for all corporate and client traffic, decreases need for an additional email platform.,Decrease in security incidents due to effective attack protection. Also central DLP technology assists in preventing email security incidents. TAP reporting/alerting of email attacks allow through help to respond to positives attacks.,We have this technology, however, it is very immature. Mainly due to the lack of raw detail as to why the email was flagged as an imposter, where other obvious imposter emails are blocked but not flagged as an imposter email/attack.,Mimecast Secure Email GatewayProofpoint is a leader at providing protection for your environment while giving you the visibility you need!We are utilizing the Proofpoint's hosted appliance as our primary email protection for spam, malware, and other threats. Information Technology deployed this across our entire organization as a reactive step due to issues related to phishing. The Proofpoint engineering team worked with us on a weekend to ensure we were able to implement and remediate the attack that was occurring.,Proofpoint allows us granular control in routing email to our end users. The end-user digest feature allows users to get a nice report every morning of all of their bulk junk mail. They get to decide if they want to release and read a message. Proofpoint has a powerful machine learning system that scores attacks in order to stop new and unknown threats.,The web portal could definitely be rewritten to make it more user-friendly. It is a bit antiquated and clunky. Needs an HTML 5 overhaul. Work could be put into making it easier to find options. Again, the interface needs overhauled. Initial installation could be streamlined with simpler documentation and assistance in understanding what features should be taken advantage of in Proofpoint vs. Office 365 from a security perspective.,9,We haven't worked to create tangible metrics, but rest assured that the ROI is quick. It doesn't take more than one social engineering attack or malware linked email to justify the purchase of Proofpoint. Instant Value creator!,We were having daily occurrences of social engineering attacks and virus-related emails. Since implementing Proofpoint, we have seen over a 90% decrease in malicious activity around our exchange email. The URL rewrite is a nice feature that allows email links to be protected before they have even been detected as malicious!,Our organization has benefited greatly from the machine learning features of Proofpoint. We have seen some email get through the scoring system, but it is something that requires fine-tuning. Brute force type attacks get stopped fairly quickly as the score rises instantly and blocks them. A great feature that we will continue to use.,,CrowdStrike Falcon Endpoint Protection, Veeam Backup & Replication, Microsoft Office 365Meets or exceeds expectationsOur Proofpoint Email Protection is being used agency-wide. It does a great job at categorizing and quarantining SPAM and malicious emails. The easy to use interface allows our Service Desk folks to manage most end-user requests while the rock-solid operations of the appliance allows administrators to 'set and forget' it. We also use it as an SMTP relay for our computer systems to send email through. Our occasional use of their technical support has been exceptional. Usually, it's not to fix an issue but a 'how do you configure it to do this?' They are very helpful and timely. I recommend Proofpoint as a company as well as the Email Protection appliance.,Our experience with ProofPoint has been great. They achieve that fine line between false positives and false negatives. The Smart Search feature turns cryptic logs into an easy to search interface that our Service Desk uses to troubleshoot email delivery issues (ie is the issue before the ProofPoint appliance or after with the Exchange environment). It gives us the flexibility to allow a subset of users to receive .zip files while others are quarantined but releasable.,I haven't run across any areas that need improving.,10,The positive affect is that we can configure our own rules that meet our business requirements. We were able to replace a deprecated SMTP relay product with the ProofPoint appliance we already owned.,Yes, our organization has benefitted from ProofPoint Email Protection. Just look at the logs/quarantine to see what and how much was blocked and you will see the value.,When an email gets through that shouldn't have, we send a copy to ProofPoint so that they can study it and learn how to block them in the future.,
Windows, Linux, Mac
Proofpoint Email Protection
77 Ratings
Score 9.0 out of 101
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>TRScore

Proofpoint Email Protection Reviews

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow'>Customer Verified: Read more.</a>
Proofpoint Email Protection
77 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>
Score 9.0 out of 101

Do you work for this company? Manage this listing

Show Filters 
Hide Filters 
Filter 77 vetted Proofpoint Email Protection reviews and ratings
Clear all filters
Overall Rating
Reviewer's Company Size
Last Updated
By Topic
Industry
Department
Experience
Job Type
Role

Reviews (1-25 of 48)

Do you use this product? Write a Review
Fraser Clark profile photo
August 15, 2019

Proofpoint email security, everything you need and more!

Score 10 out of 10
Vetted Review
Verified User
Review Source
Proofpoint is being used across our sister companies and we have an admin in each of the countries.
It is our main email security tool and is used by all of our users.

We were in need of a product that could handle higher volumes of email traffic and Proofpoint regularly features as one of the top email security products. It addresses many of the issues we were having with email security, some we didn't even realize we had. It has helped us get a very detailed overview of our email. We have extremely granular control of our inbound and outbound email.
  • Granular control of inbound and outbound email.
  • The rules that can be configured for mail are extremely impressive. An example is that you could configure rules so that if your CEO sends an email that cannot create a TLS link with the receiving MTA, then it will reinject the mail into the queue and send it again with encryption configured.
  • To ensure emails are never sent over plain text. This is but one of the examples.
  • Spam detection is amazing. Proofpoint can detect and stop around 99% of spam and this is shown in the reporting available.
  • End-user services are fantastic and cut down on admin work greatly.
  • End-users can create their own filters, release their own mail and also get end-user digests so they can see all mail that has been delivered to them.
  • The pricing is high and there are many licenses for things I feel should be part of other products.
  • The UI is slightly dated and has a lot of room for improvement.
  • The separate products should have one pane of glass for administration. Currently, if you own several of the products it feels quite disjointed when using them.
In mid-large companies, this is an excellent solution, especially if you require complex filtering. Perhaps due to regulatory reasons or maybe different departments require different rulesets. This is where Proofpoint excels in my opinion, the granularity is mind-blowing.
Companies with very large inbound & outbound mail flow are also where Proofpoint will excel.

In smaller companies that don't require the complex options that Proofpoint offers is where I would recommend a different product. Especially if they do not get large amounts of mail or aren't doing bulk sends.
Read Fraser Clark's full review
Rich Curtis profile photo
August 12, 2019

ProofPoint has proven their value and saved us from thousands of attacks

Score 8 out of 10
Vetted Review
Verified User
Review Source
We use Proofpoint email protection to filter all inbound and outbound email for the corporation worldwide. As opposed to our previous mail filter solution, Proofpoint is able to stop all malware, viruses, and nearly all spam. Additionally, we heavily use the impostor detection feature. Our executives are very commonly impersonated in an attempt to gain gift cards or other goods. Proofpoint has been able to drastically reduce these attacks.
  • Impostor detection
  • Virus detection
  • Malware prevention
  • The cost is significantly higher than other similar products on the market.
  • The administrative interface can be difficult to use. There is no search function and it can be browser-specific.
In our case, the biggest payoff is impersonation and phishing detection. Due to our industry, we are victim to a wide variety of phishing attacks. These include attempts to solicit fraudulent payments, gain customer information, or purchase gift cards to give to the attacker. Proofpoint has been able to drastically reduce these incidents. Some attacks still get through, but they are manageable with end-user training.
Read Rich Curtis's full review
Casey Ketcham profile photo
July 30, 2019

Proofpoint is pretty much foolproof

Score 9 out of 10
Vetted Review
Verified User
Review Source
We use Proofpoint Email Protection across our whole company to protect our users from getting malware, viruses, spoofed emails, phishing emails, etc. We use Office 365 as our backend email system and it works seemlessly with it. Before getting Proofpoint Email Protection we used to get tons of phishing emails and spoofed emails but 99% of those have stopped since implementing it.
  • Can send daily emails to users showing what emails got caught in their individual spam quarantine
  • Very extensive search engine to search for emails sent/received
  • Easy to block or allow emails in the system
  • It seems there are too many options to let you block or allow emails. It is easy to do still but can be confusing as there are like 5 different places you can do it so maybe simply that somehow.
  • Make an easy way to block email names vs their email address, for example if the email name says Joe Smith but the address says sweet1@hotmail.com when it should be joe.smith@yourcompany.com there should be an easy way to block that kind of email.
  • When doing searches for emails, the from address a lot of times looks weird, different than what you searched for. For example you searched for an email from bobsmith@gmail.com but the from field in the search results may say emailsender101138383093@email.server.number2113.org which is confusing.
I'd say it's well suited for medium to large businesses for sure. For a small office you could definitely get by with just using Office365/Exchange transport rules to block many bad messages. Plus with with a small business you will definitely not be getting the vast amount of message traffic as you would in a large business to justify the cost. However for med/large business it's a no brainer as it's helped a lot.
Read Casey Ketcham's full review
Mallinath Doddamani profile photo
August 12, 2019

My Proofpoint Review

Score 9 out of 10
Vetted Review
Verified User
Review Source
It has been used across the whole organization to protect us against spam and unwanted suspicious emails from the internet.
  • It identified the spam or mails which are malware, then classified them as quarantined or discarded.
  • It helps the end-user to allow/block externals users. Users can add a sender to a safe list or block list.
  • It provides the end-user the option to release emails that are blocked.
  • It would be good to have a stand-alone application instead of a web-based portal for the admin console.
  • It should ask for confirmation from admin/user before save or delete operations like Microsoft applications.
  • Admin should be able to open a ticket via the same portal, like the Office 365 portal.
Really, it is a great product.
Read Mallinath Doddamani's full review
Scott Johnson profile photo
July 30, 2019

Pro-Proofpoint!!

Score 9 out of 10
Vetted Review
Verified User
Review Source
We use Proofpoint Enterprise Email Filter, Tap and TRAP. Have had really good experience with Support and implementation and have seen really good results in protection. TRAP has came in handy as well, love it.
  • Prevents Phishing
  • Rewrites bad URL links in emails
  • SPAM
  • Admin User interface is ugly
  • regular health checks up for your cuastomers
  • send SWAG to guys that implemented it
Not sure where it would not be suitable
Read Scott Johnson's full review
Andrew Maledy profile photo
July 27, 2019

Really not happy with Proofpoint or their customer service

Score 1 out of 10
Vetted Review
Verified User
Review Source
We use it to filter spam. We aren’t using it for much more really and aren’t getting much value beyond that.
  • Stop spam
  • That is literally it
  • Our users hate how they can’t see URLs in emails
  • We don’t like that our users can’t release their own emails
Scenarios where Exchange is hosted on-prem or no other options are available.
Read Andrew Maledy's full review
michael friedman profile photo
April 15, 2019

Proofpoint - A Real World Example

Score 9 out of 10
Vetted Review
Verified User
Review Source
Proofpoint is used to protect the organization's e-mail system, along with other components. It helps protect customer information, to provide encryption, and provide TAP Real Time Protection to email.
  • TAP protects our board members against targeted spear phishing
  • Prompt review of potential zero day email exploits
  • Very intuitive GUI, that helps you find what you need, along with the metrics and reports needed.
  • Sometimes support does lag, on certain incidents. Not able to get direct phone support for a case. Need to wait for a call back.
  • Proofpoint Online notice for potential Proofpoint Hosting issues lags when needed immediately.
  • Changing of account managers seems to be happening a lot.
Read michael friedman's full review
No photo available
August 16, 2019

Proofpoint: Worth the investment

Score 8 out of 10
Vetted Review
Verified User
Review Source
My department uses Proofpoint Email Detection as a secondary email protection and logging solution. Other departments have access, but it is primarily used by the Information Security Office. The main problems it is used to solve is blocking spam and malicious emails, as well as monitoring user activity. It can also be helpful for determining if there is something wrong with our email service.
  • Extremely clear and detailed presentation of information.
  • Effective filtering of unwanted messages.
  • Great support: issues are resolved quickly and without mystery.
  • Not easy to use. There's a bit of a learning curve.
  • Encryption functionality leaves a lot to be desired.
  • We get a lot of redundant alerting because a secondary solution is blocking spam this fails to detect.
It is very good for instances where an administrator wants to track the potential impact of a phishing campaign into the organization. You can search for incoming emails using different indicators, such as the IP address of the server the message was sent from. You can also get an idea of the kind of techniques, tactics, and procedures adversaries are using. For example, we noticed a lot of phishing messages coming from usernames that closely matched our own naming convention. We were able to create a rule that prevented these kinds of messages from coming into our environment in the future.
Read this authenticated review
No photo available
August 09, 2019

A REAL solution for robust email security

Score 10 out of 10
Vetted Review
Verified User
Review Source
We use Proofpoint Email protection across our entire organization. Its primary use case is to defend against malicious emails including phishing and ransomware, for which it has done an absolutely outstanding job. Phishing was a huge risk and point of concern for our business, and since implementing Proofpoint, it is no longer a primary concern for our security team. The solution is mature, robust, and extremely effective. The reporting is clear and concise, and we provide this to the senior management team so that they can see the evidence of what the solution is protecting us from.
  • Rewriting of links in emails to send users through a proxy: extremely effective at blocking malicious links in emails
  • Attachment sandboxing: attachments are "detonated" in a sandbox and analyzed
  • Anti-Spam: extremely effective spam filtering
  • Maturity: very mature and feature rich solution which can address a variety of needs
  • User interface could be modernized, though it is effective/well organized
  • In some cases, there are small delays in the arrival of emails. Perhaps back-end performance could be upgraded for faster processing by Proofpoint
It is extremely well suited for any organization that is targeted by phishing, ransomware and other attacks via email. Organizations who handle sensitive information such as financial, medical or personal information, in particular, could very much benefit from Proofpoint. It is less appropriate in cases of certain cloud-based email vendors where a competing solution may be involved, for instance, if your organization uses Office365 and also uses the O365 Advanced Threat Prevention Module (which costs extra) then there would be some degree of feature overlap with Proofpoint. Having seen both in action, however, the Proofpoint solution is more robust in my opinion.
Read this authenticated review
No photo available
August 08, 2019

A Simple and Effective Email Protection tool

Score 10 out of 10
Vetted Review
Verified User
Review Source
We currently use Proofpoint Email Protection across our entire organization. After having this product for about 2 years and seeing how many threats it stops, I cannot see us not having it! I particularly love the granularity in being able to create very specific rules to ensure unwanted emails are blocked, while still allowing valid ones to be delivered. I can create rules based off of specific email headers, even "user-defined" headers. This is a fantastic product and we have always received prompt responses when we have engaged support.
  • Offers very granular rule creation for SPAM detection.
  • Email Firewall rules allow you to outright stop emails before the even get to a mailbox.
  • Ability to implement DMARC, DKIM, and SPF is great.
  • Would prefer a few more color choices for the dashboard (like a color picker rather than just preset colors).
  • Want ability to resize columns in Email Protection and System tabs.
  • Want additional fields available to filter by for the Firewall rules (such as Message headers).
Proofpoint Email Protection works very well to help us block unwanted emails (malware, SPAM, etc). We have been able to create email firewall rules to simply drop unwanted emails without notifying the sender. This is a great feature to stop unwanted messages, but without letting the sender know that they were rejected.
Read this authenticated review
No photo available
June 12, 2019

Proofpoint is fine, but not great

Score 4 out of 10
Vetted Review
Verified User
Review Source
We use Proofpoint Email Security for incoming, external e-mail in our organization, as our primary defense against spam and other security threats, and as a way to maintain e-mail continuity if our internal Exchange server is offline or otherwise unreachable. It prevents our users from getting flooded with unsolicited emails and phishing attacks, in most cases, which is extremely important.
  • Spam Filtering: Proofpoint does a very good job of blocking spam natively, and of course users and administrators can set up white lists and blacklists as needed to fine tune everything. There are several configuration options, but we have a quarantine digest sent to end users if it's possible but not confirmed spam. It can also be set to just stamp an email with a "spam" notice in the subject line and send directly, for anything that's suspected as spam.
  • URL Filtering: Proofpoint re-writes URLs in emails so that, if a user clicks one, it takes them to a sort of proxy site that double-checks the URL. This means that even if a malicious email gets through, there's another check before a user could potentially download some harmful file from an attacker's website.
  • E-Mail Continuity: Since email goes through Proofpoint before hitting our internal server, it can hold the e-mail in a queue in case our servers are unreachable. The mail then spools in once the servers are back, or users can log into Proofpoint from outside to check email.
  • URL Filtering: While this is a nice feature, it tends to obfuscate the URL in any readable way. Users are trained to hover over links to make sure they go where they say they're going to go, to check for anything suspicious as a security check. It's almost impossible to decipher the links once they've been rewritten by Proofpoint.
  • User Setup: Although it's fairly simple to add in a user, it takes up to an hour for the email to that user to work, and before that time, they will bounce back as an invalid user. For some reason, Proofpoint only updates its internal lists at the top of the hour.
  • User Spam Management: Since it's a third-party application, it does take a secondary login to manage white- and black-lists for users. This isn't a big deal for administrators on company-wide lists, but it's an extra, cumbersome step beyond just clicking a link for end users, which sometimes means they're not going to bother.
Depending on the circumstances, I think I would recommend a different product. The spam protection works fine, it's not terribly expensive, but there are better products with better usability out there. A very small business with little to no IT staff, perhaps using a managed service provider, might find it works for them just fine, but even then, Office 365 has pretty decent spam filtering already, and a business of that size is probably hosting their email instead of using an on-site solution.
Read this authenticated review
No photo available
August 19, 2019

Proofpoint for the win!

Score 9 out of 10
Vetted Review
Verified User
Review Source
This product is being used across the entire organization. All users who have a mailbox are also Proofpoint users. This currently solves our issue of excessive spam, gives users a quarantine/digest/whitelist/blacklist solution, and prevents e-mail viruses from reaching our environment.
  • This product is extremely configurable by an administrator. I feel like I have complete control over the product and its settings.
  • Users have fine-grained control of their anti-spam threshold levels, whitelists, blacklists, and quarantine digest options.
  • The appliances are extremely reliable. In 7 years of using Proofpoint, I have never seen an appliance crash or need to be rebooted for a reason other than a major config change or upgrade.
  • The product can be difficult to learn and master. Other comparable products are simpler to use and don't require as much time to master.
  • Reviewing logs within the GUI is an awful experience. For example, Log Reports -> Log Viewer, the text window word-wraps at ~140 characters or so, even if you have room for over 300 characters. Combing through logs that have a short word-wrap threshold like that is painful.
  • The cost of Proofpoint is higher than any other product I've piloted.
This is well suited for mid to large-sized organizations who have the staff capable of administering a powerful and complex solution. The options, settings, and configuration options are very powerful and can be tough to troubleshoot if not implemented properly. I would not recommend this for small businesses or companies that have their own small IT shop.
Read this authenticated review
No photo available
August 15, 2019

Proofpoint gets the job done

Score 9 out of 10
Vetted Review
Verified User
Review Source
We use Proofpoint Email Protection to protect our whole organization from unsolicited and malicious emails that are flooding the Internet. Proofpoint Email Protection acts as a gate keeper to considerably reduce unnecessary and time-consuming noise from reaching our users email inboxes. Less clutter means more time to concentrate on our daily tasks.
  • Highly customizable filter modules
  • Extensive search engine
  • UI design of the admin console could be improved
  • Policy route management can be complex
Proofpoint Enterprise Email Protection is well suited for any medium to large size corporations. The powerful filter modules provide protection from spam, viruses, phishing and spoofed emails, malicious URLs and attachments, etc. The solution is quite flexible and highly customizable with extensive reports that give a great overview of your email threat landscape.
Read this authenticated review
No photo available
August 15, 2019

Proofpoint is the king of email security

Score 9 out of 10
Vetted Review
Verified User
Review Source
It's being used as an email gateway for the whole organization. It sits between the organizations internal network and the internet. All the emails that flow into the organization over the internet go through the Proofpoint gateway. Similarly, all the emails that go out of the organization are processed through Proofpoint mail gateway.
  • It's scanning engines are very good and detect most of the spam or bulk mails. The scanning engines can be fine-tuned per organization by updating the signature from the samples provided by the organization.
  • The signature of the scanning engines are mostly up to date and are regularly updated for the new threats that are evolving.
  • Proofpoint allows us to create and manage complex rules at the gateway level. It's very useful in large organizations with a huge network and complex requirements.
  • Proofpoint support is mostly helpful but the wait time for the support exec to attend the case and provide a meaningful resolution is quite long.
  • Proofpoint never acknowledges or admits when some components of their products fail to deliver the desired results.
  • Some components or features do not function as advertised like TRAP. Which has some issues due to full impersonation access.
Proofpoint Email Protection is well suited for a large or small but growing organization. It has offerings like POD (Proofpoint On Demand) which is scalable per the requirement. It allows for the complex rules and attributes to be set up at the gateway level which is very useful. The scanning engines are well updated with the current emerging threats.
Read this authenticated review
No photo available
August 14, 2019

Proofpoint review

Score 8 out of 10
Vetted Review
Verified User
Review Source
Proofpoint is used by everyone in our organization as an external mail gateway with multiple appliances deployed globally. Proofpoint works as the shield protecting us from spam and other threats in emails received from third-party infrastructures. The product offers some transport rules and re-routing of emails based on various criteria. It also offers quarantine for end-users.
  • Spam control: the amount of spam removed from users' inboxes is massive.
  • It provides easy deployment with virtual appliances.
  • Reliable updates: we've never had a situation when we need to roll back the latest patch.
  • It's a somehow confusing web interface. The location of the buttons is not unified across multiple screens. We sometimes need to get through a few screens before identifying one with the required settings/parameter.
We have in-house mail infrastructure. For us, having Proofpoint appliances also in-house is a plus. Using a cloud solution might also work but, potentially, may require additional deployment and management effort.
Read this authenticated review
No photo available
August 14, 2019

Proofpoint Email Protection review

Score 10 out of 10
Vetted Review
Verified User
Review Source
We currently use Proofpoint Email Protection across our whole organization to filter out spam, bulk, viruses and unwanted email from ever getting to our end users.
  • Proofpoint Dynamic Reputation works really well for us. Approximately 82% of all of our inbound emails are blocked by Proofpoint.
  • We can customize setting to allow it to work for us by allowing or blocking emails based on all types of criteria.
  • We do not allow our end users to report SPAM so admins report SPAM and can also blacklist certain emails.
  • We use Threat Response Auto Pull (TRAP) and a lot of the malicious emails are actually pulled from the user's mailbox before they ever know that they received them.
  • When reporting SPAM the default page settings are always loaded. I would like to be able to customize the startup screen for the folder that it starts in and the length of days to search for.
  • Not all emails show up in the quarantine if they are below a certain size. We have emails that end-users request to be reported as SPAM but we are unable to in the user admin.
  • We have to go between quarantine and Smart Search quite a bit when researching emails. Maybe this information could be combined in one screen.
We have been using Proofpoint Email Protection for several years. I would not want to manage our email/computers without it.
Read this authenticated review
No photo available
August 12, 2019

Ensign ProofPoint Review

Score 9 out of 10
Vetted Review
Verified User
Review Source
We use ProofPoint to monitor and protect our inbound public emails and our outbound messages, monitoring for DLP, and other patient info. The product has been very reliable in the 6 years I have used the product. We are currently protecting over 10,000 mailboxes with a suite of ProofPoint tools, including TAPs and TRAPs. TAP has done a great job removing almost all traces of virus' getting through to our users, where we would be hit with multiple ransomware attacks in a months time to none since enrolling in the product. TRAP has also been a big help in reducing our phishing attacks. TRAP has made recalling suspect emails very easy and tracking when users click on suspect messages very simple. We get very detailed reporting and status reports of our users and that also helps us take action and preventative measures. The product suite has grown over my time as a customer and when I am asked online or by a fellow professional, I always recommend Proofpoint for email protection. My only complaint as a customer has been support response and that is only recently with the last couple support cases I have opened.
  • We receive very few incidents of SPAM in our user mailboxes. Looking at reports, you can see the service is doing its job.
  • Coming up with innovative products, like TAP. This was a great addition to really clamp down on suspect attachments.
  • MY only gripe is response time to incident requests.
The product works for us, we have a large email footprint and it does a great job.
Read this authenticated review
No photo available
August 12, 2019

Proofpoint to the rescue

Score 10 out of 10
Vetted Review
Verified User
Review Source
We use Proofpoint Email Protection to relay both inbound and outbound email with email filtering, malware, and spam protection. This also adds visibility to the email traffic for the entire company.
  • Anti-spam filtering
  • Malware protection
  • Imposter rejection
  • Email firewall rules could be more straightforward.
  • The admin interface could use more polishing.
If a company uses a self-hosted email solution i.e. Exchange server on-premises, then making Proofpoint your MX is a perfect example of how one could benefit from using this technology. More self-contained or competing solutions like Microsoft online email solutions with their own email protection would be a stretch to implement. Well, maybe for inbound traffic, and even that would be redundant.
Read this authenticated review
No photo available
April 17, 2019

Proofpoint customization capable of fitting into your business needs

Score 9 out of 10
Vetted Review
Verified User
Review Source
Proofpoint Email Protection is deployed company-wide. It helped address multiple perspectives of secure mail customization, better email protection, and threat blocking/remediation. It also allowed us to bring our archiving into one product. Even though the archiving is a separate piece, it is at least under the same bill and better than what we had prior.
  • Allows for granular customization for the best fit for the company
  • Administration is easy
  • Threat protection is effective
  • Analytics are nice
  • Advanced protection features, such as impostor attacks, work well
  • It does miss some emails that should have been flagged. You look at the body of the email, the headers, etc. and wonder how it could have gotten through, but for the most part, it does a great job
  • The email encryption seems to have some issues. Users will get random errors sometimes - like "Service unavailable" when clicking a link on an encrypted message or "the message has not reached the server or is no longer there", which can be particularly confusing to a recipient because they received an encrypted message and don't understand why this encrypted message that they just received is not in the portal
  • Some of our encryption rules get skipped somehow. It would be nice to be able to determine why
If you want to customize your solution and tailor it to your needs, Proofpoint allows for a LOT of customization, which is really great. We customize the verbiage that goes out in the encrypted emails. It helps to set up a friendlier encrypted message for recipients to trust, which is really important to us.
One of the things that I've found more difficult than say, an on-premise Barracuda Web Filter, is tracking down malicious emails that got through the protection and analyzing how they got through. You can analyze these types of emails in Proofpoint, but it takes some getting used to and takes some deciphering as well.
Read this authenticated review
No photo available
August 09, 2019

Proofpoint experience after 2 years

Score 8 out of 10
Vetted Review
Verified User
Review Source
We are using one cloud Proofpoint Email Protection instance for the whole group of about 6 companies. We wanted a better product for email protection, as our previous product was very limited in customization and we felt the protection could be better. Though Proofpoint Email Protection is not cheap, it does the job so much better. Though the basic core functionality is just to block malicious/unwanted email, the risk of having such email being delivered warrants investing in a good product.
  • Email filtering: it does the core functionality really well.
  • Reporting: the standard reports are numerous and are a big help for both administrators and management. I have not found a need for a custom report not on the default list yet.
  • Manageability & easy web administration. Use of user digests so people can manage their own spamfolder and report false positives is efficient
  • Customization via custom rules can be as specific as you want.
  • FN/FP reporting is a bit of a hassle.
  • Though training options are good, you should actually follow some training to get the extra benefits of the product to manage it better.
  • The admin GUI is not modern looking. Though a minor issue, it could help in administration.
Using it for email filtering is a very appropriate scenario. You don't want any email threat (virus/phishing) or distraction (spam) to get to the user inbox. Proofpoint Email Protection does this very well (not perfectly, but that would be very hard).
Read this authenticated review
No photo available
July 30, 2019

"This is the Email Protection Solution you are looking for." - O. Kenobi

Score 9 out of 10
Vetted Review
Verified User
Review Source
Proofpoint Email Protection is used across the entire organization. It is the cornerstone for our email security capabilities and ties into advanced email protection. Its functionality is discussed in detail in our security awareness program.
  • Blocks malicious email.
  • Enables users to better identify suspicious email.
  • Reduces the overall susceptibility of a security issue.
  • Is not fully integrated with newly acquired Wombat capabilities (e.g., two plug-ins vs. one).
  • The email digest feature is not easily configurable and is not pretty or easy to use.
It simply is the best email protection system a company can get. We currently use it with internally hosted email and will use it when we migrate to externally hosted email.
Read this authenticated review
No photo available
July 28, 2019

Customized email protection for the enterprise

Score 9 out of 10
Vetted Review
Verified User
Review Source
We use this for our entire organization. Primary requirements for bringing it in was for data loss prevention (DLP) and to meet client and regulatory requirements. We also leverage this platform for e-mail protection against spam and phishing attacks.
  • SaaS service is very resilient and stable.
  • Reporting and protection is good.
  • Data loss prevention (DLP) is very flexible and accommodates our needs..
  • Custom rules, routing policy, and processing of email meeting a wide array of needs.
  • Additional/deeper integration with other security technology.
  • Integration between Wombat (phishing campaign tool) and EM.
The entire suite meets many enterprise needs. The challenge is the over all-suite cost/pricing and comparisons with competitors like Microsoft O365.
Read this authenticated review
No photo available
July 27, 2019

Proofpoint is a leader at providing protection for your environment while giving you the visibility you need!

Score 9 out of 10
Vetted Review
Verified User
Review Source
We are utilizing the Proofpoint's hosted appliance as our primary email protection for spam, malware, and other threats. Information Technology deployed this across our entire organization as a reactive step due to issues related to phishing. The Proofpoint engineering team worked with us on a weekend to ensure we were able to implement and remediate the attack that was occurring.
  • Proofpoint allows us granular control in routing email to our end users.
  • The end-user digest feature allows users to get a nice report every morning of all of their bulk junk mail. They get to decide if they want to release and read a message.
  • Proofpoint has a powerful machine learning system that scores attacks in order to stop new and unknown threats.
  • The web portal could definitely be rewritten to make it more user-friendly. It is a bit antiquated and clunky. Needs an HTML 5 overhaul.
  • Work could be put into making it easier to find options. Again, the interface needs overhauled.
  • Initial installation could be streamlined with simpler documentation and assistance in understanding what features should be taken advantage of in Proofpoint vs. Office 365 from a security perspective.
Appropriate: If you are a business that has recently migrated to Office365 and is struggling to gain control over your email security with the built-in tools. Also, if you are a lean IT department and can't manage email security and juggle your other commitments. Less Appropriate: If you are a small shop with a minimal budget, you can fine-tune Office365 security settings instead of deploying Proofpoint. Be aware that it will take much of your time to do it.
Read this authenticated review
No photo available
July 27, 2019

Meets or exceeds expectations

Score 10 out of 10
Vetted Review
Verified User
Review Source
Our Proofpoint Email Protection is being used agency-wide. It does a great job at categorizing and quarantining SPAM and malicious emails. The easy to use interface allows our Service Desk folks to manage most end-user requests while the rock-solid operations of the appliance allows administrators to 'set and forget' it. We also use it as an SMTP relay for our computer systems to send email through. Our occasional use of their technical support has been exceptional. Usually, it's not to fix an issue but a 'how do you configure it to do this?' They are very helpful and timely. I recommend Proofpoint as a company as well as the Email Protection appliance.
  • Our experience with ProofPoint has been great. They achieve that fine line between false positives and false negatives.
  • The Smart Search feature turns cryptic logs into an easy to search interface that our Service Desk uses to troubleshoot email delivery issues (ie is the issue before the ProofPoint appliance or after with the Exchange environment).
  • It gives us the flexibility to allow a subset of users to receive .zip files while others are quarantined but releasable.
  • I haven't run across any areas that need improving.
The Proofpoint Email Protection appliance is well suited for the front door to your email system. It will protect you from the wild wild web while also protecting you when your user's accounts get compromised and send out SPAM or malicious emails. I don't know how many times it has kept us off the Black Lists.
Read this authenticated review

Proofpoint Email Protection Scorecard Summary

Feature Scorecard Summary

Anti-malware (30)
7.8
Cusomizability (29)
7.3
Data Loss Protection (15)
7.1
Threat Detection (29)
7.9
Sandboxing (20)
7.6
End-to-End Encryption (20)
7.3
Management Tools (29)
6.5

About Proofpoint Email Protection

Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities ensure business communications can continue as normal in the event of an email outage.
With Proofpoint's Email Protection, you can protect your people, data, and brand from today’s threats with:
  • The ability to detect BEC or malware-free threats using our machine learning impostor classifier (Stateful Composite Scoring Service)
  • Nearly unlimited email routing capabilities utilizing our advanced email firewall.
  • Robust reporting and email tracking/tracing using Smart Search.
  • TAP, DLP and Encryption built into the same console providing a single pain of glass for management purposes.
  • Unwanted email management that allows users to decide which emails they would like to see in their inbox.

Proofpoint Email Protection Features

Has featureAbility to detect BEC or malware-free threats using our machine learning impostor classifier (Stateful Composite Scoring Service)
Has featureNearly unlimited email routing capabilities utilizing our advanced email firewall.
Has featureRobust reporting and email tracking/tracing using Smart Search.
Has featureTAP, DLP and Encryption are built into the same console providing a single pain of glass for management purposes.
Has featureUnwanted email management allows users to decide which emails they would like to see in their inbox.

Proofpoint Email Protection Downloadables

Proofpoint Email Protection Competitors

Pricing

Has featureFree Trial Available?Yes
Does not have featureFree or Freemium Version Available?No
Does not have featurePremium Consulting/Integration Services Available?No
Entry-level set up fee?No

Proofpoint Email Protection Support Options

 Paid Version
Phone
Live Chat
Email
Forum/Community
FAQ/Knowledgebase
Video Tutorials / Webinar

Proofpoint Email Protection Technical Details

Deployment Types:On-premise, SaaS
Operating Systems: Windows, Linux, Mac
Mobile Application:No
Supported Countries:United States, Canada, United Kingdom, Germany, France, Italy, Australia, Japan
Supported Languages: Arabic, Bulgarian, Chinese (Simplified), Chinese (Traditional), Czech, Danish, Dutch, English, Finnish, French, German, Greek, Hebrew, Hindi, Hungarian, Indonesian (Bahasa), Italian, Japanese, Kazakh, Korean, Malay, Norwegian, Polish, Portuguese (Brazilian), Romanian, Russian, Sinhala, Slovak, Spanish, Swahili, Swedish, Tamil, Thai, Turkish, Ukrainian, Urdu, Vietnamese