Skip to main content
TrustRadius
Proofpoint Email Protection

Proofpoint Email Protection

Overview

What is Proofpoint Email Protection?

Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities ensure…

Read more
Recent Reviews

TrustRadius Insights

Proofpoint Email Protection is widely used across organizations for its robust capabilities in email encryption, URL protection, and virus …
Continue reading

Proofpoint Email Protection Review

9 out of 10
August 30, 2020
We use Proofpoint for all our inbound and outbound email protection. We have stopped spam from entering our network. Typically users do …
Continue reading

Great tool

9 out of 10
August 14, 2020
Incentivized
Proofpoint Email Protection is being used by us as an email gateway kind of thing. It filters and gets rid of unwanted emails (SPAM and …
Continue reading

Protection at its best

9 out of 10
December 18, 2019
Incentivized
It is being used across the whole organization; it helps in blocking suspicious URLs and helps us in keeping safe from phishing campaigns. …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 7 features
  • Anti-malware (76)
    10.0
    100%
  • Customizability (75)
    10.0
    100%
  • Threat Detection (75)
    9.0
    90%
  • Management Tools (74)
    8.0
    80%

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Proofpoint Email Protection?

Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

54 people also want pricing

Alternatives Pricing

What is FileWall?

odix - a provider of Enterprise CDR (Content Disarm and Reconstruction), is now offering its own native application for securing Microsoft Office 365 mailboxes. CDR technology is a detection-less method to disarm zero-days and Windows Defender (formerly APT)’s in files, that the vendor says is…

What is MX Layer?

MX Layer is an enterprise security company based in the United States, focusing on providing cloud-based solutions for email security, business continuity, data loss prevention and email archiving services. MX Layer aims to ensure that their comprehensive email security platform protects company's…

Return to navigation

Features

Secure Email Gateway

Secure email gateway software prevents the transmission of emails that contravene company policy or contain malware, phishing attacks, spam or other unwanted emails

9.2
Avg 8.4
Return to navigation

Product Details

What is Proofpoint Email Protection?

Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities ensure business communications can continue as normal in the event of an email outage.
With Proofpoint's Email Protection, you can protect your people, data, and brand from today’s threats with:
  • The ability to detect BEC or malware-free threats using our machine learning impostor classifier (Stateful Composite Scoring Service)
  • Nearly unlimited email routing capabilities utilizing our advanced email firewall.
  • Robust reporting and email tracking/tracing using Smart Search.
  • TAP, DLP and Encryption built into the same console providing a single pain of glass for management purposes.
  • Unwanted email management that allows users to decide which emails they would like to see in their inbox.

Proofpoint Email Protection Features

  • Supported: Ability to detect BEC or malware-free threats using our machine learning impostor classifier (Stateful Composite Scoring Service)
  • Supported: Nearly unlimited email routing capabilities utilizing our advanced email firewall.
  • Supported: Robust reporting and email tracking/tracing using Smart Search.
  • Supported: TAP, DLP and Encryption are built into the same console providing a single pain of glass for management purposes.
  • Supported: Unwanted email management allows users to decide which emails they would like to see in their inbox.

Proofpoint Email Protection Video

Proofpoint Email Protection: Protecting Against Impostor Email Threats

Proofpoint Email Protection Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationNo
Supported CountriesUnited States, Canada, United Kingdom, Germany, France, Italy, Australia, Japan
Supported LanguagesArabic, Bulgarian, Chinese (Simplified), Chinese (Traditional), Czech, Danish, Dutch, English, Finnish, French, German, Greek, Hebrew, Hindi, Hungarian, Indonesian (Bahasa), Italian, Japanese, Kazakh, Korean, Malay, Norwegian, Polish, Portuguese (Brazilian), Romanian, Russian, Sinhala, Slovak, Spanish, Swahili, Swedish, Tamil, Thai, Turkish, Ukrainian, Urdu, Vietnamese

Proofpoint Email Protection Downloadables

Frequently Asked Questions

Cisco Cloud Email Security, Symantec Encryption, and Mimecast Advanced Email Security are common alternatives for Proofpoint Email Protection.

Reviewers rate Anti-malware and Customizability highest, with a score of 10.

The most common users of Proofpoint Email Protection are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(211)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Proofpoint Email Protection is widely used across organizations for its robust capabilities in email encryption, URL protection, and virus scanning. Users have praised the software for its granular control over inbound and outbound email, allowing for detailed overview and management. The software effectively filters all incoming and outgoing emails, surpassing the capabilities of previous mail filter solutions by significantly reducing malware, viruses, and spam. One notable feature that users appreciate is the impostor detection, which has proven to be highly effective in reducing attacks targeting executives for gift cards and other goods.

Proofpoint seamlessly integrates with Office 365, offering an added layer of protection by preventing phishing and spoofed emails from reaching users. It acts as a primary spam filter, providing daily digests of filtered mail to users. For clients who prefer not to operate a dedicated email gateway, Proofpoint serves as a shared service, delivering robust perimeter defense for all email traffic. The software's ability to block communication based on domain, content, and malicious sites or links has proven successful in stopping the spread of malicious phishing content. Overall, Proofpoint Email Protection serves as a dependable email gateway that protects both inbound and outbound email users from malicious threats while efficiently minimizing spam and junk emails.

Granular control of inbound and outbound email: Users have been impressed with the granular control offered by Proofpoint for managing both inbound and outbound email. Several reviewers have mentioned that they appreciate the ability to configure rules for mail, which allows them to tailor their email management according to their specific needs.

Extensive spam detection capabilities: Many users have praised Proofpoint's extensive spam detection capabilities. They have mentioned that the software is highly effective in detecting and stopping spam, with some stating that it can detect and stop around 99% of spam. This feature has been greatly appreciated by reviewers as it helps maintain a clean inbox.

End-user services and reduced administrative work: Reviewers have highlighted the end-user services provided by Proofpoint as a major advantage. They mention that these services greatly reduce administrative work as users are able to create their own filters and release their own mail. This self-service capability not only saves time but also empowers users to manage their emails effectively.

Confusing and Cumbersome User Interface: Users have found Proofpoint's user interface to be confusing and cumbersome, requiring extra steps and making it difficult to perform tasks quickly. Some users suggest that the UI should be improved for better understanding and easier access to all features. They find the GUI interface confusing and not easy to navigate, with abysmal default settings that make it challenging to effectively filter out unwanted messages. The layout of the email protection, TAP, and TRAP dashboards has been mentioned as inconvenient, prompting users to express a desire for a more modern-looking and streamlined user interface.

Difficulties in Validating DKIM Initiation: Some users have encountered difficulties when trying to validate DKIM initiation with Proofpoint. They find the configuration consoles and options provided by Proofpoint a bit complicated, leading to confusion. As a result, they express the need for more in-depth rule customization options beyond what is currently offered.

Troubleshooting and Support Issues: Users have expressed dissatisfaction with troubleshooting and support for Proofpoint, stating that it is not straightforward. Some users have experienced unresponsiveness from the support team, encountering long wait times for resolution without receiving acknowledgement when certain components or features do not function as expected. The cluttered support portal filled with outdated information makes it difficult for them to find documentation. To improve support and case resolution, users suggest having a TAM or CSM available. Additionally, some users feel that customer support can be too generic and unhelpful at times, recommending the addition of a chat-bot assistant for better understanding of software features and issue resolution.

Attribute Ratings

Reviews

(1-25 of 95)
Companies can't remove reviews or game the system. Here's why
Score 10 out of 10
Vetted Review
Verified User
Incentivized
It's used as a whole. It helps in identifying mails delivered to the user. You can block senders & whitelist any sender with PP. You have the option to search mails with attachment & sender. The searching option is good. Quarantined mail can be downloaded & investigated for additional IOCs. Access management can be done on Quarantined folders. Overall it's a good product.
  • Searching capability is good. Can search with domains.
  • Quarantined mails can be downloaded & investigated for additional IOCs.
  • You can block senders & whitelist any sender with PP.
  • Refresh time should be increased in domain-based login.
You have a one-step solution for checking mails & blocking the same. Search results can be downloaded which helps at the time of the investigation. At the time time of phishing or ransomware attack, you can continuously monitor real-time activity.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We currently use Proofpoint Email Protection across our entire organization. After having this product for about 2 years and seeing how many threats it stops, I cannot see us not having it! I particularly love the granularity in being able to create very specific rules to ensure unwanted emails are blocked, while still allowing valid ones to be delivered. I can create rules based off of specific email headers, even "user-defined" headers. This is a fantastic product and we have always received prompt responses when we have engaged support.
  • Offers very granular rule creation for SPAM detection.
  • Email Firewall rules allow you to outright stop emails before the even get to a mailbox.
  • Ability to implement DMARC, DKIM, and SPF is great.
  • Would prefer a few more color choices for the dashboard (like a color picker rather than just preset colors).
  • Want ability to resize columns in Email Protection and System tabs.
  • Want additional fields available to filter by for the Firewall rules (such as Message headers).
Proofpoint Email Protection works very well to help us block unwanted emails (malware, SPAM, etc). We have been able to create email firewall rules to simply drop unwanted emails without notifying the sender. This is a great feature to stop unwanted messages, but without letting the sender know that they were rejected.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint is our first line of defense when it comes to emails. It constantly filters out bad emails using suspect words, known spam and phishing attempts, etc. It does a great job keeping out all unwanted badmail
  • Spam Filtering
  • DLP
  • Policy route UI, complex rules get really hard to manage
It is well suited for companies who need good email protection from spam/phishing. If you're getting hammered with these emails, Proofpoint Email Protection will definitely be able to help clear up your emails and stop unwanted attacks
Score 10 out of 10
Vetted Review
ResellerIncentivized
Proofpoint Email Protection is provided by us as a shared service for our clients who do not want to operate a dedicated email gateway.
  • System runs fast and stable.
  • The upgrade process is running very good without major issues.
  • The reporting system is very simple and needs improvement for business cases and investigation of incidents.
  • The log viewer section needs improvement regarding handling.
Proofpoint Email Protection is well suited in high performance environments where it can be used as multi-agent clusters. It is less appropriate in environments of small companies because of the high costs.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Our entire organization uses Proofpoint as a email filtering and malware blocking tool for daily email flow. Proofpoint Email Protection helps our organization to stay better protected from malicious actors by providing state-of-the-art spam, virus and malware protection for our staff and students across the entire school district.
  • Proofpoint thoroughly inspects each mail message for suspicious content.
  • Proofpoint provides minimal effort to graft into any organization's email flow.
  • Proofpoint is highly sophisticated, providing extremely granular features for email management.
  • Proofpoint could offer more frequent training opportunities to customers at all levels of expertise.
  • Proofpoint can always continue to strive to keep its product a leader in the industry.
  • Proofpoint's support site could be overhauled to provide a more logical flow.
Proofpoint has an amazing line of products! I consider them to be the next-generation email firewall for organizations. The environment is highly tunable to suit nearly any scenario that malicious actors might throw at it!
Rod Payton | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint is our email gateway protecting all inbound and outbound email users. We use it for spam, imposter, and threat remediation.
  • Implementation was the best I have ever encountered. They reviewed every switch, setting, and their implication during a half dozen sessions. This allowed me to almost achieve a set it and forget it installation which has lasted years.
  • Their periodic reviews are helpful as well as this is a deep product and you need to stay current.
  • And of course why we bought it, Proofpoint has contributed to stopping malware infections. We have not had an infection since it was installed!
  • I have a few issues with their support. First, it is an external site so you must go there and login to request assistance. This is inconvenient, especially with 2 sets of credentials. Second, no phone support until/unless you put in the ticket. I get the point, but sometimes time is of the essence. Third, as with many companies, sometimes you get into a ping pong 'battle of the SysAdmin wits'. I think their personality is that they like toying with you. In other words, multiple question and answers back and forth unless/until you call. I would expect they pick up the phone and call after the first question, so I do.
  • Getting to know the product is challenging, but this is only if you don't use it daily and because it is so deep of a product. Not a negative, just a fact.
I canot think of an inappropriate use. If you want gateway protection, this ProofPoint is 'the one'.
Score 10 out of 10
Vetted Review
Verified User
We were using Microsoft Office 365 ATP for a year before switching to Proofpoint. The product is more expensive but it does a much better job than ATP in filtering the emails. Quarantine digest is fantastic and our users love it. Proofpoint assisted us with the initial setup and administration has been easy since. It is used across our whole organization.
  • Email filtering
  • Quarantine Digest
  • Threat dashboard
  • Nothing in particular. We are happy with the product.
Nicole Dohrman | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use ProofPoint across our entire organization. This prevents a lot of malicious, spam, and junk emails from reaching our business units.
  • Customization of email firewall rules allows for detailed prevention of specific attacks.
  • Email Fraud Defense portal gives very detailed authentication information and errors to our team as we work toward full DMARC compliance.
  • The ability to insert email warning tags at the ProofPoint level prevents additional O365 mail flow rules.
  • The administrative portal is a little complex. Would like to see a more "user friendly" portal to find everything we need.
  • When creating email firewall rules, we have to manually move the rule up using the arrows into the position we want it. Would like to specify the position in the rule stack during creation.
  • When finding emails in smart search, it would be ideal to take action on the emails in the same search area rather than clicking on the email, redirecting to the quarantined folder, then having the option to take action.
ProofPoint Email Protection is very well suited for companies that consider email functionality and communication to be critical business functions. It allows for the prevention of email-based attacks and security forward rule sets that are not available in O365 or Exchange alone.
Score 9 out of 10
Vetted Review
Verified User
We use Proofpoint for all our inbound and outbound email protection. We have stopped spam from entering our network. Typically users do not receive spam and if they do they sometimes send it to the support desk letting us know one got through. Some users have been here 15 to 20 years so you know their email address has been out in the wild for a while. It is a great product and one I recommend.
  • Rate and stop spam based on the rating
  • Allow us to block email from countries that we do not work in
  • Encrypt our email coming in and out of the domain
  • Proofpoint has many options that you pay for. If you do not need the option then you do not need to pay for it, but it does help to know what is available as an option.
  • Proofpoint has a cloud service and an on-premises one. We currently just use the on-premises service and do not know anything about the cloud offering.
  • Cost is high with some of the options.
Proofpoint Email Protection is a plug-and-go solution. You can also configure Proofpoint if needed. In other words, you can forget about the service or tweak the server to your heart's content. If you are a smaller shop you may want to use something like Office 365's email protection.
August 14, 2020

Great tool

Score 9 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint Email Protection is being used by us as an email gateway kind of thing. It filters and gets rid of unwanted emails (SPAM and Phishing) that users receive all the time.
It's a pretty good application that learns with time to improve even more the protection it provides users with, making the experience better as it goes.
  • Filters emails users receive
  • Allows users to quarantine and send suspicious emails for further analysis
  • Allows users to move emails to a low priority inbox, so if they receive an email and it's not suspicious but the user don't want have that in their mailbox, they cant check on that later.
  • Implementation was a bit confusing for users, not a big issue though.
Proofpoint Email Protection is well suited for a huge variety of companies that struggles with unwanted emails or can be considered a potential phishing target. Even small companies that use email to communicate would be a good fit, the only scenario where I don't Proofpoint Email Protection being really a must is for self-employers who may use a different email client with protection features included.
Score 5 out of 10
Vetted Review
Verified User
It is being used by Email and Security teams to protect both our on premise and cloud-based email. We use email protection, TAP, and TRAP. We monitor and encrypt outgoing sensitive data through DLP capabilities and detect and block incoming phishing and malware.
  • Ability to create logical and detailed DLP rules.
  • Ability to encrypt or block based on rules.
  • Integration with Active Directory works as expected.
  • Manual Report exports are very limited in row size.
  • There is no search feature for AD groups and users within DLP rule creation.
  • Each email can only be part of one folder, so it can only trigger one monitoring rule.
  • Because of #3, we have to order rule priority. This has to be done in a very manual way with upward and downward arrows. They cannot be ordered by typing in numbers. The page refreshes and goes to the top with every arrow click, and it's pretty slow to update each time.
  • The User Interface is pretty lacking visually.
  • We have to create a rule in both Email Protection and Information Protection to use Active Directory groups in the rule.
It works well for actual functionality of the DLP detection. It does has good dictionaries and identifiers built in. But most of the things involved in the UI are pretty cumbersome and not very visually appealing. There are many extra steps needed to get some things working as desired, and you have to prioritize every monitoring rule.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint Email Protection filters all inbound emails for our entire corporation. It filters our 98% of inbound emails due to spam, virus, or other malicious content, and bulk mailings. It helps protect our employees from unwanted and nefarious emails.
  • Recipient verification
  • Email filtering
  • Data loss protection
  • Email encryption
  • SPF, DKIM, & DMARC email authentication
  • Bug: Server config corruption if you click off admin web GUI while it is saving a network change
  • Provide more robust DR fail-over
  • Provide a way to determine a message rate baseline in order to establish better SMTP rate controls.
If you need a robust, dynamic, flexible way to verify, filter, encrypt, and protect from data loss, Proofpoint Email Protection is a great product, and their sales, professional services for setup, and support staff are very responsive and provide excellent efficient service. In regards to email protection, they have proven themselves over and over again, and I don't see a scenario where they would not fit.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We are using it at the front of our organization's email. It is applied to all accounts across the organization. We use it to help identify and flag malicious and marketing emails as well as use the tools to encrypt emails that have sensitive data going out of our doors.
  • Allows for the quarantine of emails so that we have the ability to review and release emails if we deem that they are in fact legit. Some of our legit emails look spammy so the quick ability to view and release those emails is helpful.
  • With TAP having the ability to try and automatically remove emails from the inbox if it is a know bad e-mail is a lifesaver, especially during after-hours.
  • I love Tap, but the fact that it can only pull from the user's inbox is an issue with automated rules!
  • I would love to see automation uses the password in the email on the attachments to open them and find the bad emails so that Tap can remove them instead of passing them on because the attachment could not be opened.
Because we are in the financial sector many of our legit emails can look like scam emails. The intelligence feeds that we can take advantage of from Proofpoint gives us an advantage. The tools give us an easy to parse dashboard for deeper dives of real or perceived threats.
December 18, 2019

Protection at its best

Score 9 out of 10
Vetted Review
Verified User
Incentivized
It is being used across the whole organization; it helps in blocking suspicious URLs and helps us in keeping safe from phishing campaigns. It has also helped us in handling spam filtering smartly.
  • Content Blocking
  • Email ID blocking
  • While sending alerts for clicking on malicious URL by any of the user, it should also block it
  • Sandboxing

I would like to highlight points for which I find it well suited for the organization:

1)It has really helped us in categorizing the priority of alerts received from SIEM by integrating it in feeds

2) It has really reduced the phishing attacks rate.

Fraser Clark | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint is being used across our sister companies and we have an admin in each of the countries.
It is our main email security tool and is used by all of our users.

We were in need of a product that could handle higher volumes of email traffic and Proofpoint regularly features as one of the top email security products. It addresses many of the issues we were having with email security, some we didn't even realize we had. It has helped us get a very detailed overview of our email. We have extremely granular control of our inbound and outbound email.
  • Granular control of inbound and outbound email.
  • The rules that can be configured for mail are extremely impressive. An example is that you could configure rules so that if your CEO sends an email that cannot create a TLS link with the receiving MTA, then it will reinject the mail into the queue and send it again with encryption configured.
  • To ensure emails are never sent over plain text. This is but one of the examples.
  • Spam detection is amazing. Proofpoint can detect and stop around 99% of spam and this is shown in the reporting available.
  • End-user services are fantastic and cut down on admin work greatly.
  • End-users can create their own filters, release their own mail and also get end-user digests so they can see all mail that has been delivered to them.
  • The pricing is high and there are many licenses for things I feel should be part of other products.
  • The UI is slightly dated and has a lot of room for improvement.
  • The separate products should have one pane of glass for administration. Currently, if you own several of the products it feels quite disjointed when using them.
In mid-large companies, this is an excellent solution, especially if you require complex filtering. Perhaps due to regulatory reasons or maybe different departments require different rulesets. This is where Proofpoint excels in my opinion, the granularity is mind-blowing.
Companies with very large inbound & outbound mail flow are also where Proofpoint will excel.

In smaller companies that don't require the complex options that Proofpoint offers is where I would recommend a different product. Especially if they do not get large amounts of mail or aren't doing bulk sends.
Score 6 out of 10
Vetted Review
ResellerIncentivized
It is performing email security throughout the entire business. It has numerous operating brands and many different SMTP domains. The customisation available with Proofpoint allows unique branding and policies per operating company which is very valuable.
  • Strong security filtering. We've not had significant threats get past Proofpoint.
  • Customisation is strong. There are lots of options for unique policies.
  • Mail routing has lots of options with powerful rules engine.
  • Directory synchronisation configuration is clunky.
  • General administration, specifically the UI is quite poor. Making changes is not intuitive at all.
  • Terminology used by Proofpoint is not standard with other competing products so things can be confusing.
So far I've found it is suitable for large orgs with complex requirements. For smaller orgs, I find the administrative burden and complexity to be too much.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint Email Protection was selected and deployed across the entire enterprise to provide email protection from senders with malicious intent.
  • It does a good job of providing SPAM protection.
  • It does a good job of providing protection from malicious documents.
  • It does a good job of blocking file attachments we define in the policy.
  • Proofpoint has challenges with blocking all emails from a single attack campaign. If an attacker, using the same email address, sends 60 emails with similar content and/or attachments/URLs, then Proofpoint will not block all 60 emails.
  • Proofpoint has challenges blocking emails with links to credential stealing websites. On a daily basis our employees report emails that Proofpoint should have blocked.
  • Proofpoint also has challenges blocking malicious emails from compromised vendors. Proofpoint should analyze all URLs before sending the email to the recipients.
Proofpoint Email Protection is a good overall email security solution for companies with basic email security needs. It's not a great fit for companies that have a much higher frequency of malicious emails where the attackers take the time to hide their intentions - sending benign document attachments (Word document with a link to malicious websites) or emails with links to credential stealing websites that use multiple URL redirects before landing on the final page, etc.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint is being used across our whole organization. All inbound and outbound mail is protected by Proofpoint. We have been using it for about 4 years now and we are very satisfied with the results. It has done a great job of preventing viruses, phishing, impostor emails, etc.
  • Virus protection has been excellent. I cannot remember the last time an email related virus entered our company.
  • The impostor protection within Proofpoint has done a great job of preventing phishing emails.
  • We use Proofpoint for DKIM email signing for outbound mail. Very easy to configure and test.
  • Proofpoint is in the process of refining their admin UX. This will be a big improvement to their current admin UX.
  • They need to work on linking up their various portals so that you do not need to sign into 3 different portals to access your admin consoles.
  • Their working relationship with Microsoft's Office 365 support could be improved. Currently, I have to open tickets with both vendors and play the middle man negotiating fixes.
Proofpoint Email Protection is easily implemented. It does a great job at protecting your email. It has a number of features not found in O365.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
This is used for Email Protection. Some of the features are used only by a certain department. However, their email protection is enabled for the entire organization.
  • Blocks Spam.
  • URL Defense.
  • Attachment Defense.
  • Bulk Analysis in log viewer.
Proofpoint can be used if there are a lot of emails coming in and out and you do not want to manually inspect all of them, but rather only look into the emails that seem malicious.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use Proofpoint (PP) across our entire domain and have several domains covered by it. PP is our main source of spam, virus, and malicious code protection for attacks coming in from emails.
  • PP does a good job filtering spam or malicious content emails.
  • PP has a good reasonably easy user interface for the end user's management of their spam accounts.
  • PP has a robust management interface for administers to create special rules for exceptions to mail rules.
  • In some areas, PP is difficult to set up or identify how to set up custom rules. Or if they are set up it's not always easy to find what you are looking for.
  • The UI for administrators when doing a smart search is not always pretty. If there are multiple recipients the UI may stretch out far across the screen making it difficult to see what you want to see. It would be better if they wrapped that column so the results column didn't go so far off the page.
  • Common features should be first on the list when using the UI. For example, when you click user management, then Users are last in the dropdown. Settings which are hardly ever used is first. So when you click on User Management it causes you to have to scroll down further. I spend most of my day clicking and scrolling, any time you can reduce or eliminate time doing that is well worth it.
I think PP is good for medium to larger companies. Although it can be a bit slow at times so I don't know if it would work so well for a really large company. Also, you would need to have a competent IT staff capable of knowing how to configure a complex product and also know a lot about how email works in general.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint Email Protection is being used throughout the organization for email security and spam filtering. We rely on Proofpoint's expertise in email security and threat analysis to stop our users from receiving malicious attachments, excessive spam, and being phished. Proofpoint offers the "right" amount of customization to the platform, but works quite well "out of the box".
  • Recognizing spam and blocking it from coming into end user's email inboxes.
  • Threat analysis on new email threats and how to block it.
  • Customization to continually add/remove rules to strengthen our email security perimeter.
  • I think they could improve their administration GUI.
  • I think that they need/will continue to improve their threat analysis and database upkeep of "bad" IPs.
  • They need to add more functionality and the ability to "tie-in" to Office 365 GCC High.
I think Proofpoint is a great fit for almost any size company. I love the option to have Proofpoint host and manage the cluster for us, and we can just focus on adding/removing security features that we see our company in need of. I don't think Proofpoint is the correct fit for very small companies, but anyone that is looking to expand their email security should look into this product.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint Email Protection is a primary security control for my organization. With 80%+ of security breaches involving a phishing vector at some point a strong anti-phishing solution is a must today. While we have myriad secondary and complementary controls used in our defense in depth architecture, Proofpoint is our primary anti-phishing control.
  • Technical Account Manager
  • Training
  • Blocking bad email
  • Support - sometimes too generic
  • Ease of navigating portal
  • Ability to understand scoring mechanisms
Proofpoint Email Protection is well suited for large organizations who are likely targeted for business email compromise or other cyber threats that may originate through phishing. Proofpoint Email Protection may not be well suited for smaller, less mature organizations.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We have implemented it across the organization. It helps secure us from spam, malware, phishing and social engineering.
  • URL Redirection is one of the best feature to stop users from opening any unknown URL and spread a virus.
  • Policies to stop malware and phishing attack.
  • Can do better in stopping spam
Can create a more customized solution based on TAP dashboard reports for your email protection. It can work better on email phishing and malware.
Score 8 out of 10
Vetted Review
Verified User
Incentivized

Proofpoint Email Protection helps Advent stop both malware and non-malware threats, including imposter emails and Business Email Compromise (BEC) attempts.

This email filtering service has been good, and Proofpoint's uptime has been stellar in the 5 years we've utilized the product.

  • Highlights BEC attempts
  • Blocks malware
  • Granting access to Proofpoint's management console is a real pain in the butt.... You have to email support with the individual user names, emails and phone numbers, and then Proofpoint sends them a link for required user training, and access isn't granted until they've completed the training.
Sometimes emails with malicious links get through, and Proofpoint doesn't realize they're malicious until a few hours later. So now you have bad content already sitting in user mailboxes that wasn't previously blocked...
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use Proofpoint in our Cyber Defense team not across all the organisation. As it is used to protect the unwanted traffic from being communicated to our organisation's users. We use Proofpoint to block communication based on the domain, the content of the mail, malicious site, or link present in the mail. For example if I learned that some malicious content (for example a malicious phishing site) in being spread using the mail in our organisation we reach out to Proofpoint to block the content of the mail being communicated to our users with the help of Proofpoint (in cases that it's the same in all the mail). We also use the domain being used to send the mail to our users (we used to attach a sample mail for better understanding of content). According to the priority of the case they take desired action. So ultimately it helps to stop any malicious phishing content from being spread across our organisation and protect all the users being targeted of such unwanted content from the web. Once a site is being blocked by Proofpoint it will not be accessible to the organisational user if if they clicked on it accidentally.
  • When a bulk of unwanted mail start triggering against your organisation and removing them from web in an instant node is not possible, Proofpoint help as an instant measure to stop such flow.
  • In case, when something malicious being spread in your organisation and you want user to remain uninfected even after clicking on the malicious link, Proofpoint proves as a major solution as it prevent blocked domains to be open by any user.
  • It also act as an AD-HOC measure when you have to know in advance about some threat and you have the IOC of the threat you can add that in advance in block lost in Proofpoint. That helps to prevent any future harm to the organisation.
  • UI can be improved for better and easy understanding of all features.
  • They should have a chat-bot type assistant for better understanding of all its features and easy understanding while raising or working on any issue by the user.
  • AI might help to improve threat hunting and make it more useful for a security organisation, Where using AI Proofpoint suggest a number of existing threat list to organisation. Help in pro-active steps to stop being targeted by any malicious content over the web.
A very useful and beneficial application for almost all of the organisation operating over the web as being on the web means being in danger to get phished or spoofed, to safeguard a large number of user base it is required to have Proofpoint so one can easily block a content that proves harmful for the whole organisation. Can be blocked using Proofpoint within minutes. A number of times we have scenarios where hackers are trying to get the user spoofed using false content and send a large number of emails to almost all users. If our organization at that time reached out to all the users to stop them from being targeted from the mail - it seemed impossible. So we use Proofpoint to get the malicious content inaccessible for anyone in the organisation.
Return to navigation