Skip to main content
TrustRadius
Proofpoint Email Protection

Proofpoint Email Protection

Overview

What is Proofpoint Email Protection?

Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities ensure…

Read more
Recent Reviews

TrustRadius Insights

Proofpoint Email Protection is widely used across organizations for its robust capabilities in email encryption, URL protection, and virus …
Continue reading

Proofpoint Email Protection Review

9 out of 10
August 30, 2020
We use Proofpoint for all our inbound and outbound email protection. We have stopped spam from entering our network. Typically users do …
Continue reading

Great tool

9 out of 10
August 14, 2020
Incentivized
Proofpoint Email Protection is being used by us as an email gateway kind of thing. It filters and gets rid of unwanted emails (SPAM and …
Continue reading

Protection at its best

9 out of 10
December 18, 2019
Incentivized
It is being used across the whole organization; it helps in blocking suspicious URLs and helps us in keeping safe from phishing campaigns. …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 7 features
  • Anti-malware (76)
    10.0
    100%
  • Customizability (75)
    10.0
    100%
  • Threat Detection (75)
    9.0
    90%
  • Management Tools (74)
    8.0
    80%

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Proofpoint Email Protection?

Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

54 people also want pricing

Alternatives Pricing

What is FileWall?

odix - a provider of Enterprise CDR (Content Disarm and Reconstruction), is now offering its own native application for securing Microsoft Office 365 mailboxes. CDR technology is a detection-less method to disarm zero-days and Windows Defender (formerly APT)’s in files, that the vendor says is…

What is MX Layer?

MX Layer is an enterprise security company based in the United States, focusing on providing cloud-based solutions for email security, business continuity, data loss prevention and email archiving services. MX Layer aims to ensure that their comprehensive email security platform protects company's…

Return to navigation

Features

Secure Email Gateway

Secure email gateway software prevents the transmission of emails that contravene company policy or contain malware, phishing attacks, spam or other unwanted emails

9.2
Avg 8.4
Return to navigation

Product Details

What is Proofpoint Email Protection?

Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities ensure business communications can continue as normal in the event of an email outage.
With Proofpoint's Email Protection, you can protect your people, data, and brand from today’s threats with:
  • The ability to detect BEC or malware-free threats using our machine learning impostor classifier (Stateful Composite Scoring Service)
  • Nearly unlimited email routing capabilities utilizing our advanced email firewall.
  • Robust reporting and email tracking/tracing using Smart Search.
  • TAP, DLP and Encryption built into the same console providing a single pain of glass for management purposes.
  • Unwanted email management that allows users to decide which emails they would like to see in their inbox.

Proofpoint Email Protection Features

  • Supported: Ability to detect BEC or malware-free threats using our machine learning impostor classifier (Stateful Composite Scoring Service)
  • Supported: Nearly unlimited email routing capabilities utilizing our advanced email firewall.
  • Supported: Robust reporting and email tracking/tracing using Smart Search.
  • Supported: TAP, DLP and Encryption are built into the same console providing a single pain of glass for management purposes.
  • Supported: Unwanted email management allows users to decide which emails they would like to see in their inbox.

Proofpoint Email Protection Video

Proofpoint Email Protection: Protecting Against Impostor Email Threats

Proofpoint Email Protection Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationNo
Supported CountriesUnited States, Canada, United Kingdom, Germany, France, Italy, Australia, Japan
Supported LanguagesArabic, Bulgarian, Chinese (Simplified), Chinese (Traditional), Czech, Danish, Dutch, English, Finnish, French, German, Greek, Hebrew, Hindi, Hungarian, Indonesian (Bahasa), Italian, Japanese, Kazakh, Korean, Malay, Norwegian, Polish, Portuguese (Brazilian), Romanian, Russian, Sinhala, Slovak, Spanish, Swahili, Swedish, Tamil, Thai, Turkish, Ukrainian, Urdu, Vietnamese

Proofpoint Email Protection Downloadables

Frequently Asked Questions

Cisco Cloud Email Security, Symantec Encryption, and Mimecast Advanced Email Security are common alternatives for Proofpoint Email Protection.

Reviewers rate Anti-malware and Customizability highest, with a score of 10.

The most common users of Proofpoint Email Protection are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(211)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Proofpoint Email Protection is widely used across organizations for its robust capabilities in email encryption, URL protection, and virus scanning. Users have praised the software for its granular control over inbound and outbound email, allowing for detailed overview and management. The software effectively filters all incoming and outgoing emails, surpassing the capabilities of previous mail filter solutions by significantly reducing malware, viruses, and spam. One notable feature that users appreciate is the impostor detection, which has proven to be highly effective in reducing attacks targeting executives for gift cards and other goods.

Proofpoint seamlessly integrates with Office 365, offering an added layer of protection by preventing phishing and spoofed emails from reaching users. It acts as a primary spam filter, providing daily digests of filtered mail to users. For clients who prefer not to operate a dedicated email gateway, Proofpoint serves as a shared service, delivering robust perimeter defense for all email traffic. The software's ability to block communication based on domain, content, and malicious sites or links has proven successful in stopping the spread of malicious phishing content. Overall, Proofpoint Email Protection serves as a dependable email gateway that protects both inbound and outbound email users from malicious threats while efficiently minimizing spam and junk emails.

Granular control of inbound and outbound email: Users have been impressed with the granular control offered by Proofpoint for managing both inbound and outbound email. Several reviewers have mentioned that they appreciate the ability to configure rules for mail, which allows them to tailor their email management according to their specific needs.

Extensive spam detection capabilities: Many users have praised Proofpoint's extensive spam detection capabilities. They have mentioned that the software is highly effective in detecting and stopping spam, with some stating that it can detect and stop around 99% of spam. This feature has been greatly appreciated by reviewers as it helps maintain a clean inbox.

End-user services and reduced administrative work: Reviewers have highlighted the end-user services provided by Proofpoint as a major advantage. They mention that these services greatly reduce administrative work as users are able to create their own filters and release their own mail. This self-service capability not only saves time but also empowers users to manage their emails effectively.

Confusing and Cumbersome User Interface: Users have found Proofpoint's user interface to be confusing and cumbersome, requiring extra steps and making it difficult to perform tasks quickly. Some users suggest that the UI should be improved for better understanding and easier access to all features. They find the GUI interface confusing and not easy to navigate, with abysmal default settings that make it challenging to effectively filter out unwanted messages. The layout of the email protection, TAP, and TRAP dashboards has been mentioned as inconvenient, prompting users to express a desire for a more modern-looking and streamlined user interface.

Difficulties in Validating DKIM Initiation: Some users have encountered difficulties when trying to validate DKIM initiation with Proofpoint. They find the configuration consoles and options provided by Proofpoint a bit complicated, leading to confusion. As a result, they express the need for more in-depth rule customization options beyond what is currently offered.

Troubleshooting and Support Issues: Users have expressed dissatisfaction with troubleshooting and support for Proofpoint, stating that it is not straightforward. Some users have experienced unresponsiveness from the support team, encountering long wait times for resolution without receiving acknowledgement when certain components or features do not function as expected. The cluttered support portal filled with outdated information makes it difficult for them to find documentation. To improve support and case resolution, users suggest having a TAM or CSM available. Additionally, some users feel that customer support can be too generic and unhelpful at times, recommending the addition of a chat-bot assistant for better understanding of software features and issue resolution.

Attribute Ratings

Reviews

(26-50 of 95)
Companies can't remove reviews or game the system. Here's why
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We implemented the Proofpoint solution approximately 18 months ago. It has proved to be invaluable. We use it institution wide and have been very pleased. The imposter prevention module alone prevented a great number of potential threats. We spend much less time putting out fires because Proofpoint is working so well. We had an excellent implementation team who took the time needed to maximize deployment and ensure our understanding of the product. Support is prompt to respond when needed.
  • Deployment was excellent. With over 25 years experience of working with vendor assisted deployments, I will say this was definitely one of the smoothest I every experienced.
  • The imposter prevention module is an excellent tool that saves lots of time.
  • I love the smart search functionality.
  • TAP Dashboard is definitely a favorite feature.
  • I would like the smart search section to have a message preview area.

Proofpoint email protection is very well suited for our environment. They continue to build on the technology and its use has greatly reduced the time it takes to manage malicious mail, search for messages, and contain threats. The daily digest is also a great feature that allows end users to decide for themselves what messages they want or do not want to receive.

From a protection standpoint, I can't think of a scenario where Proofpoint is not appropriate.

Score 7 out of 10
Vetted Review
Verified User
Incentivized
We are currently using the Proofpoint suite across our entire campus. Proofpoint has proven to be a wonderful tool for alerting us when a malicious or phishing email comes in. We are most appreciative that it is so much easier to pull the messages by using the smart search feature. Also the automatic pulling and quarantining the message.
  • The ease of use of the system. The initial setup can be daunting but once it is up and running it practically runs itself.
  • The quick response from Proofpoint when an email that was sent to a mailbox but was later found to be malicious.
  • One thing I like is the fact that if we pull an email which later turns out to be good we are then able to un-quarantine the messages, either a few or all.
  • The ease of use of the smart search feature. This makes putting together a CSV file to use in TRAP to pull messages from mailboxes on campus much easier than having to run a exchange PowerShell to remove mail from mailboxes, especially when you have multiple exchange servers
  • Search feature
  • Easier location to block URLS and or email addresses
  • Unable to locate emails which have been quarantined
Using Proofpoint email protection helps assist in our daily routine of ensuring our email system is safe and secure. The feature where it pulls emails from the user's email accounts and displays to us whether the email was read or unread helps us in determining if a user needs to have further training.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Our organization uses it for all incoming emails to protect from numerous threats.
  • Limited false positives
  • Allows for a lot of customization of settings to meet our business needs
  • More automated reporting features for management would be useful.
It's a great enterprise suite of tools, but not for a small business.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
First, we tested Proofpoint with one of the company domains, and then it was implemented across the entire organization. The problems encountered were simple, for example, emails from our customers were cataloged as spam, Proofpoint was making more advanced inspections of the files, the Proofpoint sandbox delayed the arrival of emails, the AdQueue folder was not known and it was thought that they were missing posts.
  • The support - Proofpoint always has trained personnel to handle complicated situations.
  • Management - Proofpoint allows you to manage each of the product components from a centralized console.
  • Intelligence - Proofpoint has different inspection engines including a sandbox, which allows you to detect threats even when other brands do not.
  • It should improve integration of the encryption portal with a second authentication factor, it is only integrated with development.
  • The admin account does not have the access to do low-level troubleshooting, only the support account.
  • In the encryption portal, it only appears in English regardless of the configuration.
Proofpoint Email Protection is more suitable for the detection of gaps and the investigation of events. Proofpoint has a friendly administrative console, and with tools that make an investigation easy. It is less suitable in integration with products of other brands, for example, integration with RSA SecurID.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint is used by our organization for email spam/virus detection and email attachment sandboxing.
  • Great customer support
  • Great spam filtering and rule customization
  • The ability to create a list of attachments that are allowed instead of only a "block X attachments" list.
  • The ability to integrate false positive detection reporting directly into the GUI.
  • The ability to make more in-depth rule customization past its current offerings.
Proofpoint Email Protection is an amazing tool that I recommend to all businesses thanks to their great customer support and quality product.
Kote Sudhakar | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Healthcare client is using Proofpoint Protection Server and we manage the complete environment of email security.
  • It’s customisable and policy based.
  • Management interface is user friendly.
  • It’s dynamic.
  • I am happy with whatever is provided.
It’s suitable for all types of industry from small-scale to enterprise.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We are using Proofpoint currently for email security (TAP) and this is for our global level implementation.
  • Very strong and good at identifying threats
  • Very good to block the unwanted and new phishing attacks along with Spam and Malware attacks
  • Very strong and cooperative support from Proofpoint
  • Very good experience with Proofpoint support - always very fast and immediate assistance
  • Maybe need to be stronger at capturing the URL and attachment defences before we report attacks.
  • I do agree no product will be able to block all sorts of new malware/phishing attacks, however Proofpoint could be more proactive rather than reactive.
  • Maybe more options for search queries and for easier administration. I am good with the config, consoles etc. But I could see people getting confused with the few options and consoles we have. They may feel like it is a bit complicated.
We have had many spoofing and malware attacks which have been proactively identified by Proofpoint and reported to us as well. And also the monthly newsletters are very useful. I am very happy with Proofpoint's tech support and the way we get support very quickly.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Entire org. SPAM, phishing, general email sanitation.
  • SPAM defense
  • phishing
  • malware protection
  • possibly spoofing/imposter identification ease of use.
Email protection is well suited for any organization.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use Proofpoint Email Protection to protect our emails from malicious content coming into the organization. We also use it for DLP on outgoing emails.
  • Good email protection and spam filtering
  • Easy search for identifying emails coming in
  • DLP protection has customization options to fit business needs
  • Until you get to know why sections and config options are in a certain area it seems random and confusing.
  • It would be better if it interacted with their other products more smoothly.
  • Customizing the spam filtering can take a little while to dial in.
Well suited:
Proofpoint does a pretty good job at protecting us from spam emails. I was able to block a lot of emails coming from SendGrid by blocking SendGrid emails with a custom spam filter. However, SendGrid has a lot of legit emails too so I was able to create another rule to allow those emails from certain people, then block the rest. That way business need was met but spam emails are blocked.

Less Appropriate
If you are trying to monitor internal to internal emails Proofpoint is probably a little over featured for that.
October 22, 2019

Proofpoint Rocks

Jane Updegraff | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use Proofpoint as our primary perimeter defense for all email traffic. Inbound email goes first to Proofpoint's servers for checking and then once vetted by Proofpoint, email goes to our on-premise Exchange servers for distribution. Proofpoint also rewrites all URLs contained in emails so that users cannot open URLs without them being tested in a Proofpoint sandbox first.
  • Proofpoint does a nearly perfect job of rewriting URLs in emails to our users. They can very rarely click on a link that does NOT go to a Proofpoint sandbox URL.
  • Proofpoint does a fantastic job of detecting "imposter" emails where the sender is attempting to impersonate a C-level officer for the purpose of fraud. All we had to do was tell it which names to look for as "sender" and match up the sender display name with the sender email address. when there is a mismatch, Proofpoint re-directs the email straight to our MIS team and the recipeitn doesn't even see it.
  • Proofpoint does a very good job of identifying email-transported threats. We often get notified immediately that an end user has received a malicious email and even when it is a zero-day threat, they generally notify us within minutes of the nature of the threat.
  • I think that Proofpoint could potentially speed up their identification of certain kinds of threats. Other than that i can't think of anything, they are just that good.
I think Proofpoint is probably the best perimeter email defense out there. The only area that could potentially improve is their cumbersome GUI on their portal pages. It's hard to navigate. But once you get used to it, it does everything that you could ask for it to do.
Jorge Golvano | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User
Incentivized
We use it across the whole organization nationwide.
  • Spam detection
  • Phishing prevention
  • Virus detection
  • Management interface
  • False positive reporting
  • System performance
It's a very good filtering solution but not without its problems and issues, especially their so-called cloud implementation which is nothing more than an appliance with storage and performance limitations.

The configuration is very detailed, but at the same time it's not very intuitive and some things are very hard to set up.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Currently, we use Proofpoint to scan emails for our faculty and staff only. It addresses many issues that we have experienced in the past, such as impostor detection and phishing type emails.
  • The product has been stable since we deployed it. It updates regularly with minimal downtime.
  • It provides a easily to navigate interface for for users in regards to viewing/releasing their quarantined items
  • Proofpoint's spam detection is second to none. It is a little aggressive at times, but false positives are often remedied.
  • The support team is great and responds quickly to any issue that arises.
  • I scan the quarantine folders everyday for false positively caught email. I report the FPs that I find to Proofpoint support (everyday), but unfortunately there are always items to release.
  • I wish that there was a method to run a health check on the server without the need for support to login
Proofpoint Email Protection is well suited for a medium on-premises email deployment. I do not have any experience with the cloud-based offering.
Manoj Rana | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint is used to protect our email communication. Proofpoint is used in our whole organization as a gateway server for mailing. Proofpoint does a good filtering mail which reduced the number of cyberattacks and also allows us to add some exceptions to mail filtration. That way, we can allow secure mail to be delivered to our users without it getting blocked by Proofpoint.
  • Mail filtration: Proofpoint has its own algorithm but we still can create a rule for mail flirtation.
  • Organizational blacklist: We can block domains, SMTP addresses, or any IP.
  • Inbound mail: Only added or authorized domain mail will be passed by ProofPoint to the internal mail server.
  • Quarantine: This is a good feature which allows us to control the blocked mail and if we feel mail id good, then we can take the action.
  • Spam: Spam detection is also good.
  • Quarantine storage: We receive lots of emails and we feel the storage capacity of Proofpoint is lacking. We cannot keep the mail in the quarantined folder for more than a week.
I feel that wether the company is mid-level or enterprise and require any complex mail filtering, then ProofPoint is best. Again, each department has its own requirements related to mail rules, so ProofPoint plays a very good role in these scenarios. For a small organization, I don't think they require any complex filtering and cost is a big factor.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Our Proofpoint Email gateway is our first and strongest layer of protection against today's advanced world of phishing and malware, helping defend our entire organization from business email compromise threats. Having previously worked with other technologies, there is no question, in my opinion, that Proofpoint is the clear leader in email protection.
  • Defend against impostor email attacks.
  • Defends against zero-day threats.
  • It integrates well with our cloud email platform.
  • There are too many portals to access the various Proofpoint products. I.e. one for email gateway, one for TAP, one for CAD.
  • The support portal is cluttered and full of outdated information.
  • Documentation is hard to find at times when searching via the support portal.
Proofpoint Email Protection is well suited to be the first line of defense in protecting against email threats. The environment is highly customizable, giving you the ability to reach the sweet spot between protecting your organization and providing a great end-user experience.
Score 8 out of 10
Vetted Review
Verified User
Incentivized

It is being used throughout the organization. We use various features like TAP, TRAP. It is efficient and the global updates help in minimizing threats.

Sometimes it behaves weirdly in reporting FP due to which quarantined legitimate emails. We are planning to use PP to directly connect applications to send emails to clients especially for marketing purposes.

  • TAP
  • TRAP
  • Cloud Updates from various clients of Proofpoint.
  • Policy routes don't work correctly at times.
  • False Positive is a pain at times, essential business emails are quarantined.
  • DNS routing can be an issue at times.

If you want a global threat to be identified before entering your organization, you have this information readily available pre & post-delivery of emails to the vulnerable clients. It also allows you to restrict emails to be delivered to vulnerable users and delete emails from the affected users.

False Positive is good at times as it quarantines affected emails

Transport rule, suspicious sender, etc are some features which help differentiate between legit senders.

Scheduled reports to identify potential issues and analyze the daily/weekly/monthly traffic.

September 26, 2019

Proofpoint Pros and Cons

Score 8 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint is being used by the entire company to block spam and monitor incoming and outgoing external emails.
  • Block and accept senders
  • Send out daily end-user digests.
  • Respond to customer tickets.
  • Training on configurations for firewall rules.
  • Training on running configurations for end-user digests.
  • Notifying the client when there is an issue with the admin console.
Some components on the Proofpoint Admin Console are user-friendly when it applies to adding blocked or accepted senders. When messages aren't delivered, Proofpoint could do a better job of making sure the reasoning for not delivering the message is clear. For instance, if a status is "@fr.com are being quarantined and discarded," we'd like to know why?
Oliver Strojan | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
It is the central E-Mail Gateway. It filters out e-mails. It protects user by using url defense for example impostor, dmarc…..
  • It is "easy" to manage, it works stable and they do have a fantastic support.
  • I even worked with a PPS Consultant helping to implement EFD (email fraud defense).
  • He has a very good knowledge in his area and is very helpfull.
  • As all PPS Systems consists as clusters there never was an outage. Even patching the Systems is more or less one click.
  • If I compare this with oter systems it is pretty simple and it always has worked. Not a single issue during patching.
  • Impostor function may be improved so it detects this more reliable. We opened many tickets to report impostor mails. Now it is a little bit better.
  • Message tracking gui (the display of the results) is sometimes broken depending on the results returned. That was working fine in the past and with one patch this issue was introduced and never fixed
Good product, good support.
Keith Krus | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use Proofpoint for email protection. We use Office 365 to host email, and ProofPoint alongside with Office 365 across our entire organization and we have been able to reduce virus, spam, and malware emails by over 95%. The biggest security threats we encounter nowadays are sent via email and Proofpoint is able to help protect us.
  • Spam protection. Spam emails as we all know are annoying and can contain phishing material.
  • Virus protection. Protecting our entire network from threats.
  • Malware protection. Prevent spammers/hackers from creating back doors into our network.
  • No changes in my opinion.
Proofpoint not only protects against threats via email but its also a helpful tool for tracking/tracking down emails if a user on our network believes they have not received an email. On multiple occasions, I have used Proofpoint smart searches to assist with tracking emails.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We are using it as an internal SMTP gateway between our customers' applications and digital senders, and our end-users or application-serviced customers. We selected Proofpoint Email Protection in part to meet a DKIM stamping need driven by adoption of a DMARC policy as mandated on all USG Executive Branch domains two years ago. We also needed to replace our prior system due to McAfee's departure from this product space. We also use other Proofpoint SaaS products in our email eco-system, and while no vendor has perfect products ( i wouldn't have a job if IT solutions were perfect...) my experience is that Proofpoint's support teams work towards meeting our business needs.
  • Purchased turn-key implementation services for our on-premises clusters, this proved to be a good buy!
  • Professional Services answered our questions and helped us move our configuration smoothly to the new appliances.
  • Also helped us with public-CA and DKIM implementations that were outside our prior systems.
  • Patching has been painless so far and easy to manage for our engineers.
  • Support cases are well supported in general,
  • We could use a TAM or CSM if that were available.
  • Cases can drag on at times due to loss in focus.
Proofpoint Email Protection is well suited as a straight up email gateway and has a good A/V, supportable core system. The cost alignment on the 'bells and whistles' we haven't purchased licenses for, moves this into a less affordable range per seat cost. I trust the engineering/integration of these specialty tools into the whole, but selling ROI up to leadership for moving these away from our cloud services provider is a steep proposition.
September 11, 2019

Proofpoint Rules!

Score 9 out of 10
Vetted Review
Verified User
Incentivized
We are using it to align security practices and provide protection from email threat vectors. Proofpoint is used across most of the organization. There are some outliers that are not protected by Proofpoint. It serves to protect many protected resources from access due to malware and virus outbreaks. It addresses users unknowingly hitting links and or attachments within the email system.
  • Improves security vectors in email.
  • Sandboxing bad URL and detonating malicious email content.
  • Using the product frees up time for other admin tasks.
  • The web interface.
  • Nothing else, the product is great.
Proofpoint is well suited for reporting, TAP and TRAP. The product works well on-premises as well as in the cloud. To not have a product like Proofpoint in your enterprise is a mistake. It is a fantastic product to protect your data and secure the enterprise. Professional services and training are stand-out characteristics for the company and product.
Score 9 out of 10
Vetted Review
Verified User
Incentivized

We are using Proofpoint Email Protection across our whole organization to filter out spam, bulk, viruses and unwanted email from ever getting to our end-users. We are using it for inbound and outbound mail flow.

  • Proofpoint uses a multi-layered approach in terms of scanning emails. Each and every message has to pass through different layers like Proofpoint Dynamic Reputation, virus protection, spam protection, targeted attack protection(URL defense and attachment defense) to be judged as bad email or clean email.
  • Proofpoint is very effective in blocking spam emails and reducing false positives with its MLX and SCSC technology.
  • Proofpoint's approach is different from the traditional email security tool in blocking the imposter emails. We have observed that 80% of the imposter emails are blocked by Proofpoint even though it can evade easily any filtering solution because imposter emails don't have any malicious attributes.
  • I have used almost all features in Proofpoint such as TLS, secure messaging, DLP, dictionaries, custom firewall rules, end-user digest, etc. It helps a lot to protect our environment from a cyber attack.
  • I feel Proofpoint has to improve the logs and reporting feature as it is not accurate some times.
  • Firewall rule can not be created in the middle of an order as per our choice, it has to be manually moved up or down.
  • It would be better if Proofpoint could block the message that matches the imposter display name that we add under imposter display name option. But Proofpoint doesn't block those messages, it just increases or decreases the imposter score.
Proofpoint is aggressive in blocking malicious attachments. The cloud sandboxing is very effective and blocks 99% of the attachment threat. Proofpoint's URL rewrite option hugely reduces the chance of allowing end-users to access a phishing site.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint Email Protection is being used across the whole of the corporation. We are filtering and inspecting both inbound and outbound email. Proofpoint has proven to be very beneficial for our organization. It is allowing us to eliminate the majority of spam email, which is in great abundance. We are also capturing any offensive language and malicious content that may be very well hidden inside email containers. Without Proofpoint, our users would be flooded with spam and malicious emails that could possibly bring our productivity to a halt. While we are far from being a fortune 500 company, we are never-the-less intercepting over one hundred and fifty thousand emails per week. In addition, Proofpoint customer service is outstanding. With high-level knowledge and quick response times, they always provide help and assistance when needed.
  • Spam protection is very effective, and we are intercepting an incredible amount of spam that would normally negatively impact production.
  • Safeguarding users - Our users appreciate using the digest. It allows them to make decisions and take action on specific emails.
  • Proofpoint has never failed us over the last five years of use.
  • It would be nice if language filtering could consider the context of how words are being used.
Proofpoint is well suited for corporate-wide inbound and outbound filtering. It also provides the ability to manage filtering very granularly, in ways such as using whitelists for permitting exceptions. With the advent of email cloud services, it is easier for attackers to infiltrate an organization. Proofpoint has proven its capability to execute detailed inspections of these types of emails.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use Proofpoint Email Protection across the whole organization. It is used to scan all incoming email into the organization to filter out spam and potential threats based on preset rules we configured. We also use Proofpoint to encrypt any internal and outgoing emails. Having the ability to setup rules for the email firewall makes it really easy to manage what comes in and goes out of our organization and quarantine and the logs that Proofpoint provides gives us a simple and easy to use way to see what exactly is being blocked, at what time and who the intended receivers would have been. If something gets quarantined by mistake, it is just as easy to forward the message on to the intended user.
  • Email firewall
  • End user logging
  • Email encryption
  • Search function only goes back about a month
  • Maintenance hours conflict with our business hours because of timezone differences
Proofpoint is a great tool to protect end-users from malicious emails. We collect logs of all spam and threat emails sent to our users for our internal audit's and the data is always a great showing. The email backup is also very useful for our end users. Over the past couple years we starting making the push to get our users to stop relying on large .pst files to store their email archives, which for some users ended up taking up multiple GB of space on our network storage. Being able to use the Proofpoint archive gives them the ability to look through all the email they've received or sent back to a specific set date.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
It's an email gateway system for the Mascom.bw domain. It addresses spam, viruses, phishing, imposters etc.
  • Great Spam/Virus/Phish Filter
  • Self Software Updates - No user Intervention!!
  • Very Stable
  • Easy UI
  • Using the Firewall Rules
  • Adding a new SSL certificate for administration
Blocking unwanted emails that are thousands a day! I can't think of a scenario when it is not appropriate.
Return to navigation