Skip to main content
TrustRadius
Proofpoint Email Protection

Proofpoint Email Protection

Overview

What is Proofpoint Email Protection?

Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities ensure…

Read more
Recent Reviews

TrustRadius Insights

Proofpoint Email Protection is widely used across organizations for its robust capabilities in email encryption, URL protection, and virus …
Continue reading

Proofpoint Email Protection Review

9 out of 10
August 30, 2020
We use Proofpoint for all our inbound and outbound email protection. We have stopped spam from entering our network. Typically users do …
Continue reading

Great tool

9 out of 10
August 14, 2020
Incentivized
Proofpoint Email Protection is being used by us as an email gateway kind of thing. It filters and gets rid of unwanted emails (SPAM and …
Continue reading

Protection at its best

9 out of 10
December 18, 2019
Incentivized
It is being used across the whole organization; it helps in blocking suspicious URLs and helps us in keeping safe from phishing campaigns. …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 7 features
  • Anti-malware (76)
    10.0
    100%
  • Customizability (75)
    10.0
    100%
  • Threat Detection (75)
    9.0
    90%
  • Management Tools (74)
    8.0
    80%

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Proofpoint Email Protection?

Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

53 people also want pricing

Alternatives Pricing

What is FileWall?

odix - a provider of Enterprise CDR (Content Disarm and Reconstruction), is now offering its own native application for securing Microsoft Office 365 mailboxes. CDR technology is a detection-less method to disarm zero-days and Windows Defender (formerly APT)’s in files, that the vendor says is…

What is MX Layer?

MX Layer is an enterprise security company based in the United States, focusing on providing cloud-based solutions for email security, business continuity, data loss prevention and email archiving services. MX Layer aims to ensure that their comprehensive email security platform protects company's…

Return to navigation

Features

Secure Email Gateway

Secure email gateway software prevents the transmission of emails that contravene company policy or contain malware, phishing attacks, spam or other unwanted emails

9.2
Avg 8.4
Return to navigation

Product Details

What is Proofpoint Email Protection?

Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities ensure business communications can continue as normal in the event of an email outage.
With Proofpoint's Email Protection, you can protect your people, data, and brand from today’s threats with:
  • The ability to detect BEC or malware-free threats using our machine learning impostor classifier (Stateful Composite Scoring Service)
  • Nearly unlimited email routing capabilities utilizing our advanced email firewall.
  • Robust reporting and email tracking/tracing using Smart Search.
  • TAP, DLP and Encryption built into the same console providing a single pain of glass for management purposes.
  • Unwanted email management that allows users to decide which emails they would like to see in their inbox.

Proofpoint Email Protection Features

  • Supported: Ability to detect BEC or malware-free threats using our machine learning impostor classifier (Stateful Composite Scoring Service)
  • Supported: Nearly unlimited email routing capabilities utilizing our advanced email firewall.
  • Supported: Robust reporting and email tracking/tracing using Smart Search.
  • Supported: TAP, DLP and Encryption are built into the same console providing a single pain of glass for management purposes.
  • Supported: Unwanted email management allows users to decide which emails they would like to see in their inbox.

Proofpoint Email Protection Video

Proofpoint Email Protection: Protecting Against Impostor Email Threats

Proofpoint Email Protection Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationNo
Supported CountriesUnited States, Canada, United Kingdom, Germany, France, Italy, Australia, Japan
Supported LanguagesArabic, Bulgarian, Chinese (Simplified), Chinese (Traditional), Czech, Danish, Dutch, English, Finnish, French, German, Greek, Hebrew, Hindi, Hungarian, Indonesian (Bahasa), Italian, Japanese, Kazakh, Korean, Malay, Norwegian, Polish, Portuguese (Brazilian), Romanian, Russian, Sinhala, Slovak, Spanish, Swahili, Swedish, Tamil, Thai, Turkish, Ukrainian, Urdu, Vietnamese

Proofpoint Email Protection Downloadables

Frequently Asked Questions

Cisco Cloud Email Security, Symantec Encryption, and Mimecast Advanced Email Security are common alternatives for Proofpoint Email Protection.

Reviewers rate Anti-malware and Customizability highest, with a score of 10.

The most common users of Proofpoint Email Protection are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(211)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Proofpoint Email Protection is widely used across organizations for its robust capabilities in email encryption, URL protection, and virus scanning. Users have praised the software for its granular control over inbound and outbound email, allowing for detailed overview and management. The software effectively filters all incoming and outgoing emails, surpassing the capabilities of previous mail filter solutions by significantly reducing malware, viruses, and spam. One notable feature that users appreciate is the impostor detection, which has proven to be highly effective in reducing attacks targeting executives for gift cards and other goods.

Proofpoint seamlessly integrates with Office 365, offering an added layer of protection by preventing phishing and spoofed emails from reaching users. It acts as a primary spam filter, providing daily digests of filtered mail to users. For clients who prefer not to operate a dedicated email gateway, Proofpoint serves as a shared service, delivering robust perimeter defense for all email traffic. The software's ability to block communication based on domain, content, and malicious sites or links has proven successful in stopping the spread of malicious phishing content. Overall, Proofpoint Email Protection serves as a dependable email gateway that protects both inbound and outbound email users from malicious threats while efficiently minimizing spam and junk emails.

Granular control of inbound and outbound email: Users have been impressed with the granular control offered by Proofpoint for managing both inbound and outbound email. Several reviewers have mentioned that they appreciate the ability to configure rules for mail, which allows them to tailor their email management according to their specific needs.

Extensive spam detection capabilities: Many users have praised Proofpoint's extensive spam detection capabilities. They have mentioned that the software is highly effective in detecting and stopping spam, with some stating that it can detect and stop around 99% of spam. This feature has been greatly appreciated by reviewers as it helps maintain a clean inbox.

End-user services and reduced administrative work: Reviewers have highlighted the end-user services provided by Proofpoint as a major advantage. They mention that these services greatly reduce administrative work as users are able to create their own filters and release their own mail. This self-service capability not only saves time but also empowers users to manage their emails effectively.

Confusing and Cumbersome User Interface: Users have found Proofpoint's user interface to be confusing and cumbersome, requiring extra steps and making it difficult to perform tasks quickly. Some users suggest that the UI should be improved for better understanding and easier access to all features. They find the GUI interface confusing and not easy to navigate, with abysmal default settings that make it challenging to effectively filter out unwanted messages. The layout of the email protection, TAP, and TRAP dashboards has been mentioned as inconvenient, prompting users to express a desire for a more modern-looking and streamlined user interface.

Difficulties in Validating DKIM Initiation: Some users have encountered difficulties when trying to validate DKIM initiation with Proofpoint. They find the configuration consoles and options provided by Proofpoint a bit complicated, leading to confusion. As a result, they express the need for more in-depth rule customization options beyond what is currently offered.

Troubleshooting and Support Issues: Users have expressed dissatisfaction with troubleshooting and support for Proofpoint, stating that it is not straightforward. Some users have experienced unresponsiveness from the support team, encountering long wait times for resolution without receiving acknowledgement when certain components or features do not function as expected. The cluttered support portal filled with outdated information makes it difficult for them to find documentation. To improve support and case resolution, users suggest having a TAM or CSM available. Additionally, some users feel that customer support can be too generic and unhelpful at times, recommending the addition of a chat-bot assistant for better understanding of software features and issue resolution.

Attribute Ratings

Reviews

(1-25 of 95)
Companies can't remove reviews or game the system. Here's why
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Searching capability is good. Can search with domains.
  • Quarantined mails can be downloaded & investigated for additional IOCs.
  • You can block senders & whitelist any sender with PP.
  • Refresh time should be increased in domain-based login.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Offers very granular rule creation for SPAM detection.
  • Email Firewall rules allow you to outright stop emails before the even get to a mailbox.
  • Ability to implement DMARC, DKIM, and SPF is great.
  • Would prefer a few more color choices for the dashboard (like a color picker rather than just preset colors).
  • Want ability to resize columns in Email Protection and System tabs.
  • Want additional fields available to filter by for the Firewall rules (such as Message headers).
Score 10 out of 10
Vetted Review
ResellerIncentivized
  • System runs fast and stable.
  • The upgrade process is running very good without major issues.
  • The reporting system is very simple and needs improvement for business cases and investigation of incidents.
  • The log viewer section needs improvement regarding handling.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Proofpoint thoroughly inspects each mail message for suspicious content.
  • Proofpoint provides minimal effort to graft into any organization's email flow.
  • Proofpoint is highly sophisticated, providing extremely granular features for email management.
  • Proofpoint could offer more frequent training opportunities to customers at all levels of expertise.
  • Proofpoint can always continue to strive to keep its product a leader in the industry.
  • Proofpoint's support site could be overhauled to provide a more logical flow.
Rod Payton | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Implementation was the best I have ever encountered. They reviewed every switch, setting, and their implication during a half dozen sessions. This allowed me to almost achieve a set it and forget it installation which has lasted years.
  • Their periodic reviews are helpful as well as this is a deep product and you need to stay current.
  • And of course why we bought it, Proofpoint has contributed to stopping malware infections. We have not had an infection since it was installed!
  • I have a few issues with their support. First, it is an external site so you must go there and login to request assistance. This is inconvenient, especially with 2 sets of credentials. Second, no phone support until/unless you put in the ticket. I get the point, but sometimes time is of the essence. Third, as with many companies, sometimes you get into a ping pong 'battle of the SysAdmin wits'. I think their personality is that they like toying with you. In other words, multiple question and answers back and forth unless/until you call. I would expect they pick up the phone and call after the first question, so I do.
  • Getting to know the product is challenging, but this is only if you don't use it daily and because it is so deep of a product. Not a negative, just a fact.
Nicole Dohrman | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Customization of email firewall rules allows for detailed prevention of specific attacks.
  • Email Fraud Defense portal gives very detailed authentication information and errors to our team as we work toward full DMARC compliance.
  • The ability to insert email warning tags at the ProofPoint level prevents additional O365 mail flow rules.
  • The administrative portal is a little complex. Would like to see a more "user friendly" portal to find everything we need.
  • When creating email firewall rules, we have to manually move the rule up using the arrows into the position we want it. Would like to specify the position in the rule stack during creation.
  • When finding emails in smart search, it would be ideal to take action on the emails in the same search area rather than clicking on the email, redirecting to the quarantined folder, then having the option to take action.
Score 9 out of 10
Vetted Review
Verified User
  • Rate and stop spam based on the rating
  • Allow us to block email from countries that we do not work in
  • Encrypt our email coming in and out of the domain
  • Proofpoint has many options that you pay for. If you do not need the option then you do not need to pay for it, but it does help to know what is available as an option.
  • Proofpoint has a cloud service and an on-premises one. We currently just use the on-premises service and do not know anything about the cloud offering.
  • Cost is high with some of the options.
August 14, 2020

Great tool

Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Filters emails users receive
  • Allows users to quarantine and send suspicious emails for further analysis
  • Allows users to move emails to a low priority inbox, so if they receive an email and it's not suspicious but the user don't want have that in their mailbox, they cant check on that later.
  • Implementation was a bit confusing for users, not a big issue though.
Score 5 out of 10
Vetted Review
Verified User
  • Ability to create logical and detailed DLP rules.
  • Ability to encrypt or block based on rules.
  • Integration with Active Directory works as expected.
  • Manual Report exports are very limited in row size.
  • There is no search feature for AD groups and users within DLP rule creation.
  • Each email can only be part of one folder, so it can only trigger one monitoring rule.
  • Because of #3, we have to order rule priority. This has to be done in a very manual way with upward and downward arrows. They cannot be ordered by typing in numbers. The page refreshes and goes to the top with every arrow click, and it's pretty slow to update each time.
  • The User Interface is pretty lacking visually.
  • We have to create a rule in both Email Protection and Information Protection to use Active Directory groups in the rule.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Recipient verification
  • Email filtering
  • Data loss protection
  • Email encryption
  • SPF, DKIM, & DMARC email authentication
  • Bug: Server config corruption if you click off admin web GUI while it is saving a network change
  • Provide more robust DR fail-over
  • Provide a way to determine a message rate baseline in order to establish better SMTP rate controls.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Allows for the quarantine of emails so that we have the ability to review and release emails if we deem that they are in fact legit. Some of our legit emails look spammy so the quick ability to view and release those emails is helpful.
  • With TAP having the ability to try and automatically remove emails from the inbox if it is a know bad e-mail is a lifesaver, especially during after-hours.
  • I love Tap, but the fact that it can only pull from the user's inbox is an issue with automated rules!
  • I would love to see automation uses the password in the email on the attachments to open them and find the bad emails so that Tap can remove them instead of passing them on because the attachment could not be opened.
Fraser Clark | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Granular control of inbound and outbound email.
  • The rules that can be configured for mail are extremely impressive. An example is that you could configure rules so that if your CEO sends an email that cannot create a TLS link with the receiving MTA, then it will reinject the mail into the queue and send it again with encryption configured.
  • To ensure emails are never sent over plain text. This is but one of the examples.
  • Spam detection is amazing. Proofpoint can detect and stop around 99% of spam and this is shown in the reporting available.
  • End-user services are fantastic and cut down on admin work greatly.
  • End-users can create their own filters, release their own mail and also get end-user digests so they can see all mail that has been delivered to them.
  • The pricing is high and there are many licenses for things I feel should be part of other products.
  • The UI is slightly dated and has a lot of room for improvement.
  • The separate products should have one pane of glass for administration. Currently, if you own several of the products it feels quite disjointed when using them.
Score 6 out of 10
Vetted Review
ResellerIncentivized
  • Strong security filtering. We've not had significant threats get past Proofpoint.
  • Customisation is strong. There are lots of options for unique policies.
  • Mail routing has lots of options with powerful rules engine.
  • Directory synchronisation configuration is clunky.
  • General administration, specifically the UI is quite poor. Making changes is not intuitive at all.
  • Terminology used by Proofpoint is not standard with other competing products so things can be confusing.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
  • It does a good job of providing SPAM protection.
  • It does a good job of providing protection from malicious documents.
  • It does a good job of blocking file attachments we define in the policy.
  • Proofpoint has challenges with blocking all emails from a single attack campaign. If an attacker, using the same email address, sends 60 emails with similar content and/or attachments/URLs, then Proofpoint will not block all 60 emails.
  • Proofpoint has challenges blocking emails with links to credential stealing websites. On a daily basis our employees report emails that Proofpoint should have blocked.
  • Proofpoint also has challenges blocking malicious emails from compromised vendors. Proofpoint should analyze all URLs before sending the email to the recipients.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Virus protection has been excellent. I cannot remember the last time an email related virus entered our company.
  • The impostor protection within Proofpoint has done a great job of preventing phishing emails.
  • We use Proofpoint for DKIM email signing for outbound mail. Very easy to configure and test.
  • Proofpoint is in the process of refining their admin UX. This will be a big improvement to their current admin UX.
  • They need to work on linking up their various portals so that you do not need to sign into 3 different portals to access your admin consoles.
  • Their working relationship with Microsoft's Office 365 support could be improved. Currently, I have to open tickets with both vendors and play the middle man negotiating fixes.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • PP does a good job filtering spam or malicious content emails.
  • PP has a good reasonably easy user interface for the end user's management of their spam accounts.
  • PP has a robust management interface for administers to create special rules for exceptions to mail rules.
  • In some areas, PP is difficult to set up or identify how to set up custom rules. Or if they are set up it's not always easy to find what you are looking for.
  • The UI for administrators when doing a smart search is not always pretty. If there are multiple recipients the UI may stretch out far across the screen making it difficult to see what you want to see. It would be better if they wrapped that column so the results column didn't go so far off the page.
  • Common features should be first on the list when using the UI. For example, when you click user management, then Users are last in the dropdown. Settings which are hardly ever used is first. So when you click on User Management it causes you to have to scroll down further. I spend most of my day clicking and scrolling, any time you can reduce or eliminate time doing that is well worth it.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Recognizing spam and blocking it from coming into end user's email inboxes.
  • Threat analysis on new email threats and how to block it.
  • Customization to continually add/remove rules to strengthen our email security perimeter.
  • I think they could improve their administration GUI.
  • I think that they need/will continue to improve their threat analysis and database upkeep of "bad" IPs.
  • They need to add more functionality and the ability to "tie-in" to Office 365 GCC High.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Highlights BEC attempts
  • Blocks malware
  • Granting access to Proofpoint's management console is a real pain in the butt.... You have to email support with the individual user names, emails and phone numbers, and then Proofpoint sends them a link for required user training, and access isn't granted until they've completed the training.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • When a bulk of unwanted mail start triggering against your organisation and removing them from web in an instant node is not possible, Proofpoint help as an instant measure to stop such flow.
  • In case, when something malicious being spread in your organisation and you want user to remain uninfected even after clicking on the malicious link, Proofpoint proves as a major solution as it prevent blocked domains to be open by any user.
  • It also act as an AD-HOC measure when you have to know in advance about some threat and you have the IOC of the threat you can add that in advance in block lost in Proofpoint. That helps to prevent any future harm to the organisation.
  • UI can be improved for better and easy understanding of all features.
  • They should have a chat-bot type assistant for better understanding of all its features and easy understanding while raising or working on any issue by the user.
  • AI might help to improve threat hunting and make it more useful for a security organisation, Where using AI Proofpoint suggest a number of existing threat list to organisation. Help in pro-active steps to stop being targeted by any malicious content over the web.
Return to navigation