Skip to main content
TrustRadius
Proofpoint Email Protection

Proofpoint Email Protection

Overview

What is Proofpoint Email Protection?

Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities ensure…

Read more
Recent Reviews

TrustRadius Insights

Proofpoint Email Protection is widely used across organizations for its robust capabilities in email encryption, URL protection, and virus …
Continue reading

Proofpoint Email Protection Review

9 out of 10
August 30, 2020
We use Proofpoint for all our inbound and outbound email protection. We have stopped spam from entering our network. Typically users do …
Continue reading

Great tool

9 out of 10
August 14, 2020
Incentivized
Proofpoint Email Protection is being used by us as an email gateway kind of thing. It filters and gets rid of unwanted emails (SPAM and …
Continue reading

Protection at its best

9 out of 10
December 18, 2019
Incentivized
It is being used across the whole organization; it helps in blocking suspicious URLs and helps us in keeping safe from phishing campaigns. …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 7 features
  • Anti-malware (76)
    10.0
    100%
  • Customizability (75)
    10.0
    100%
  • Threat Detection (75)
    9.0
    90%
  • Management Tools (74)
    8.0
    80%

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Proofpoint Email Protection?

Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

54 people also want pricing

Alternatives Pricing

What is FileWall?

odix - a provider of Enterprise CDR (Content Disarm and Reconstruction), is now offering its own native application for securing Microsoft Office 365 mailboxes. CDR technology is a detection-less method to disarm zero-days and Windows Defender (formerly APT)’s in files, that the vendor says is…

What is MX Layer?

MX Layer is an enterprise security company based in the United States, focusing on providing cloud-based solutions for email security, business continuity, data loss prevention and email archiving services. MX Layer aims to ensure that their comprehensive email security platform protects company's…

Return to navigation

Features

Secure Email Gateway

Secure email gateway software prevents the transmission of emails that contravene company policy or contain malware, phishing attacks, spam or other unwanted emails

9.2
Avg 8.4
Return to navigation

Product Details

What is Proofpoint Email Protection?

Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities ensure business communications can continue as normal in the event of an email outage.
With Proofpoint's Email Protection, you can protect your people, data, and brand from today’s threats with:
  • The ability to detect BEC or malware-free threats using our machine learning impostor classifier (Stateful Composite Scoring Service)
  • Nearly unlimited email routing capabilities utilizing our advanced email firewall.
  • Robust reporting and email tracking/tracing using Smart Search.
  • TAP, DLP and Encryption built into the same console providing a single pain of glass for management purposes.
  • Unwanted email management that allows users to decide which emails they would like to see in their inbox.

Proofpoint Email Protection Features

  • Supported: Ability to detect BEC or malware-free threats using our machine learning impostor classifier (Stateful Composite Scoring Service)
  • Supported: Nearly unlimited email routing capabilities utilizing our advanced email firewall.
  • Supported: Robust reporting and email tracking/tracing using Smart Search.
  • Supported: TAP, DLP and Encryption are built into the same console providing a single pain of glass for management purposes.
  • Supported: Unwanted email management allows users to decide which emails they would like to see in their inbox.

Proofpoint Email Protection Video

Proofpoint Email Protection: Protecting Against Impostor Email Threats

Proofpoint Email Protection Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationNo
Supported CountriesUnited States, Canada, United Kingdom, Germany, France, Italy, Australia, Japan
Supported LanguagesArabic, Bulgarian, Chinese (Simplified), Chinese (Traditional), Czech, Danish, Dutch, English, Finnish, French, German, Greek, Hebrew, Hindi, Hungarian, Indonesian (Bahasa), Italian, Japanese, Kazakh, Korean, Malay, Norwegian, Polish, Portuguese (Brazilian), Romanian, Russian, Sinhala, Slovak, Spanish, Swahili, Swedish, Tamil, Thai, Turkish, Ukrainian, Urdu, Vietnamese

Proofpoint Email Protection Downloadables

Frequently Asked Questions

Cisco Cloud Email Security, Symantec Encryption, and Mimecast Advanced Email Security are common alternatives for Proofpoint Email Protection.

Reviewers rate Anti-malware and Customizability highest, with a score of 10.

The most common users of Proofpoint Email Protection are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(211)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Proofpoint Email Protection is widely used across organizations for its robust capabilities in email encryption, URL protection, and virus scanning. Users have praised the software for its granular control over inbound and outbound email, allowing for detailed overview and management. The software effectively filters all incoming and outgoing emails, surpassing the capabilities of previous mail filter solutions by significantly reducing malware, viruses, and spam. One notable feature that users appreciate is the impostor detection, which has proven to be highly effective in reducing attacks targeting executives for gift cards and other goods.

Proofpoint seamlessly integrates with Office 365, offering an added layer of protection by preventing phishing and spoofed emails from reaching users. It acts as a primary spam filter, providing daily digests of filtered mail to users. For clients who prefer not to operate a dedicated email gateway, Proofpoint serves as a shared service, delivering robust perimeter defense for all email traffic. The software's ability to block communication based on domain, content, and malicious sites or links has proven successful in stopping the spread of malicious phishing content. Overall, Proofpoint Email Protection serves as a dependable email gateway that protects both inbound and outbound email users from malicious threats while efficiently minimizing spam and junk emails.

Granular control of inbound and outbound email: Users have been impressed with the granular control offered by Proofpoint for managing both inbound and outbound email. Several reviewers have mentioned that they appreciate the ability to configure rules for mail, which allows them to tailor their email management according to their specific needs.

Extensive spam detection capabilities: Many users have praised Proofpoint's extensive spam detection capabilities. They have mentioned that the software is highly effective in detecting and stopping spam, with some stating that it can detect and stop around 99% of spam. This feature has been greatly appreciated by reviewers as it helps maintain a clean inbox.

End-user services and reduced administrative work: Reviewers have highlighted the end-user services provided by Proofpoint as a major advantage. They mention that these services greatly reduce administrative work as users are able to create their own filters and release their own mail. This self-service capability not only saves time but also empowers users to manage their emails effectively.

Confusing and Cumbersome User Interface: Users have found Proofpoint's user interface to be confusing and cumbersome, requiring extra steps and making it difficult to perform tasks quickly. Some users suggest that the UI should be improved for better understanding and easier access to all features. They find the GUI interface confusing and not easy to navigate, with abysmal default settings that make it challenging to effectively filter out unwanted messages. The layout of the email protection, TAP, and TRAP dashboards has been mentioned as inconvenient, prompting users to express a desire for a more modern-looking and streamlined user interface.

Difficulties in Validating DKIM Initiation: Some users have encountered difficulties when trying to validate DKIM initiation with Proofpoint. They find the configuration consoles and options provided by Proofpoint a bit complicated, leading to confusion. As a result, they express the need for more in-depth rule customization options beyond what is currently offered.

Troubleshooting and Support Issues: Users have expressed dissatisfaction with troubleshooting and support for Proofpoint, stating that it is not straightforward. Some users have experienced unresponsiveness from the support team, encountering long wait times for resolution without receiving acknowledgement when certain components or features do not function as expected. The cluttered support portal filled with outdated information makes it difficult for them to find documentation. To improve support and case resolution, users suggest having a TAM or CSM available. Additionally, some users feel that customer support can be too generic and unhelpful at times, recommending the addition of a chat-bot assistant for better understanding of software features and issue resolution.

Attribute Ratings

Reviews

(51-75 of 95)
Companies can't remove reviews or game the system. Here's why
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint is being used across the entire organization. It is invaluable for providing protection against spam, bulk email, spoofed email, etc. It provides protection for not only our users but ultimately for our customers as well. While we provide on-going training for our users on what to watch for in suspicious emails, Proofpoint takes a lot of the guesswork out of the equation.
  • Spam - catches these emails before hitting the inbox.
  • Daily digest - provides users with a list of the emails that were blocked and allows them to choose to release them if they are legitimate emails.
  • Ensures that emails coming into our organization is safe for our users and verifies the email is coming from stated senders email server.
  • Configuration can be complex at times. there are multiple areas to track a path of a configuration setting.
  • Would like to be able to assign roles to helpdesk staff with more granularity.
  • Navigation within the product could be more streamlined.
Proofpoint does a great job at protecting our users and ultimately our customers and their personal information. It provides a means to block unwanted emails that may be spam, spoofed, bulk, etc. Users are also able to determine if they want a blocked email and release it to their mailbox without assistance from IT.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
It is used for email for 85% of Mass State agencies and as a mail relay for thousands of in-house applications. It is our highly dependable spam solution.
  • Great spam protection.
  • TAP option works very well.
  • Configuring policy routes is very helpful.
  • Master console configurations and push to agents is very simple.
  • Improve message search to include more details.
  • More details when a message has a status of incomplete.
  • Log info needs a little improving.
So far the Proofpoint Email Protection has worked well for the Comm of Mass. The solution with the TAP Option has really cut down on the amount of spam being released. Proofpoint support is also great and very helpful with any cases we open with them. For the amount of e-mail traffic received/sent this solution works very well.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint Email Protection is used across the entire organization. Since phishing attacks are the largest threat vector, the Proofpoint cloud solution provides a rock-solid level of protection for our end users that utilize email on a daily basis. The solution not only protects our users from malicious activity but also the loss of productivity by weeding out spam and other useless emails.
  • Effectively discards spam definite emails.
  • Protects users from malicious activity.
  • Performance of inspection is very efficient.
  • Operational availability is very high.
  • Features such as TAP and others are separate packages from a price point (not bundled).
  • Email quarantines are not always 100% accurate.
  • Some occasional false positives with email delivery.
Proofpoint Email Protection is a mission-critical security solution for any large enterprise. Email is usually the blood life of the company and its operations. With that, users are targeted via email for harvesting credentials and phishing attacks. The effectiveness and operational state of this security solution are what makes Proofpoint excel compared to its competitors. Proofpoint is always trying to stay one step ahead of the bad actors.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
This product is being used across the entire organization. All users who have a mailbox are also Proofpoint users. This currently solves our issue of excessive spam, gives users a quarantine/digest/whitelist/blacklist solution, and prevents e-mail viruses from reaching our environment.
  • This product is extremely configurable by an administrator. I feel like I have complete control over the product and its settings.
  • Users have fine-grained control of their anti-spam threshold levels, whitelists, blacklists, and quarantine digest options.
  • The appliances are extremely reliable. In 7 years of using Proofpoint, I have never seen an appliance crash or need to be rebooted for a reason other than a major config change or upgrade.
  • The product can be difficult to learn and master. Other comparable products are simpler to use and don't require as much time to master.
  • Reviewing logs within the GUI is an awful experience. For example, Log Reports -> Log Viewer, the text window word-wraps at ~140 characters or so, even if you have room for over 300 characters. Combing through logs that have a short word-wrap threshold like that is painful.
  • The cost of Proofpoint is higher than any other product I've piloted.
This is well suited for mid to large-sized organizations who have the staff capable of administering a powerful and complex solution. The options, settings, and configuration options are very powerful and can be tough to troubleshoot if not implemented properly. I would not recommend this for small businesses or companies that have their own small IT shop.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
My department uses Proofpoint Email Detection as a secondary email protection and logging solution. Other departments have access, but it is primarily used by the Information Security Office. The main problems it is used to solve is blocking spam and malicious emails, as well as monitoring user activity. It can also be helpful for determining if there is something wrong with our email service.
  • Extremely clear and detailed presentation of information.
  • Effective filtering of unwanted messages.
  • Great support: issues are resolved quickly and without mystery.
  • Not easy to use. There's a bit of a learning curve.
  • Encryption functionality leaves a lot to be desired.
  • We get a lot of redundant alerting because a secondary solution is blocking spam this fails to detect.
It is very good for instances where an administrator wants to track the potential impact of a phishing campaign into the organization. You can search for incoming emails using different indicators, such as the IP address of the server the message was sent from. You can also get an idea of the kind of techniques, tactics, and procedures adversaries are using. For example, we noticed a lot of phishing messages coming from usernames that closely matched our own naming convention. We were able to create a rule that prevented these kinds of messages from coming into our environment in the future.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use Proofpoint Email Protection to protect our whole organization from unsolicited and malicious emails that are flooding the Internet. Proofpoint Email Protection acts as a gate keeper to considerably reduce unnecessary and time-consuming noise from reaching our users email inboxes. Less clutter means more time to concentrate on our daily tasks.
  • Highly customizable filter modules
  • Extensive search engine
  • UI design of the admin console could be improved
  • Policy route management can be complex
Proofpoint Enterprise Email Protection is well suited for any medium to large size corporations. The powerful filter modules provide protection from spam, viruses, phishing and spoofed emails, malicious URLs and attachments, etc. The solution is quite flexible and highly customizable with extensive reports that give a great overview of your email threat landscape.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
It's being used as an email gateway for the whole organization. It sits between the organizations internal network and the internet. All the emails that flow into the organization over the internet go through the Proofpoint gateway. Similarly, all the emails that go out of the organization are processed through Proofpoint mail gateway.
  • It's scanning engines are very good and detect most of the spam or bulk mails. The scanning engines can be fine-tuned per organization by updating the signature from the samples provided by the organization.
  • The signature of the scanning engines are mostly up to date and are regularly updated for the new threats that are evolving.
  • Proofpoint allows us to create and manage complex rules at the gateway level. It's very useful in large organizations with a huge network and complex requirements.
  • Proofpoint support is mostly helpful but the wait time for the support exec to attend the case and provide a meaningful resolution is quite long.
  • Proofpoint never acknowledges or admits when some components of their products fail to deliver the desired results.
  • Some components or features do not function as advertised like TRAP. Which has some issues due to full impersonation access.
Proofpoint Email Protection is well suited for a large or small but growing organization. It has offerings like POD (Proofpoint On Demand) which is scalable per the requirement. It allows for the complex rules and attributes to be set up at the gateway level which is very useful. The scanning engines are well updated with the current emerging threats.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use Proofpoint for a coorporate-wide email gateway both internal and external. Serves as a phishing, email, malware, sandboxing filter.
  • Email filtering rules - Easily write rules to deter and direct emails.
  • Quarantine - Great ability to quarantine with different formulas as well as a nice interface for end-user maintenance of queues.
  • Virus and malware filtering.
  • Could make the GUI interface easier to traverse.
Proofpoint Email Protection fits really well as an overall email gateway. I think the ability to get very granular with the rules and filtering makes it a great front end to email.
August 15, 2019

Proofpoint review

Score 8 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint is used by everyone in our organization as an external mail gateway with multiple appliances deployed globally. Proofpoint works as the shield protecting us from spam and other threats in emails received from third-party infrastructures. The product offers some transport rules and re-routing of emails based on various criteria. It also offers quarantine for end-users.
  • Spam control: the amount of spam removed from users' inboxes is massive.
  • It provides easy deployment with virtual appliances.
  • Reliable updates: we've never had a situation when we need to roll back the latest patch.
  • It's a somehow confusing web interface. The location of the buttons is not unified across multiple screens. We sometimes need to get through a few screens before identifying one with the required settings/parameter.
We have in-house mail infrastructure. For us, having Proofpoint appliances also in-house is a plus. Using a cloud solution might also work but, potentially, may require additional deployment and management effort.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We currently use Proofpoint Email Protection across our whole organization to filter out spam, bulk, viruses and unwanted email from ever getting to our end users.
  • Proofpoint Dynamic Reputation works really well for us. Approximately 82% of all of our inbound emails are blocked by Proofpoint.
  • We can customize setting to allow it to work for us by allowing or blocking emails based on all types of criteria.
  • We do not allow our end users to report SPAM so admins report SPAM and can also blacklist certain emails.
  • We use Threat Response Auto Pull (TRAP) and a lot of the malicious emails are actually pulled from the user's mailbox before they ever know that they received them.
  • When reporting SPAM the default page settings are always loaded. I would like to be able to customize the startup screen for the folder that it starts in and the length of days to search for.
  • Not all emails show up in the quarantine if they are below a certain size. We have emails that end-users request to be reported as SPAM but we are unable to in the user admin.
  • We have to go between quarantine and Smart Search quite a bit when researching emails. Maybe this information could be combined in one screen.
We have been using Proofpoint Email Protection for several years. I would not want to manage our email/computers without it.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use ProofPoint to monitor and protect our inbound public emails and our outbound messages, monitoring for DLP, and other patient info. The product has been very reliable in the 6 years I have used the product. We are currently protecting over 10,000 mailboxes with a suite of ProofPoint tools, including TAPs and TRAPs. TAP has done a great job removing almost all traces of virus' getting through to our users, where we would be hit with multiple ransomware attacks in a months time to none since enrolling in the product. TRAP has also been a big help in reducing our phishing attacks. TRAP has made recalling suspect emails very easy and tracking when users click on suspect messages very simple. We get very detailed reporting and status reports of our users and that also helps us take action and preventative measures. The product suite has grown over my time as a customer and when I am asked online or by a fellow professional, I always recommend Proofpoint for email protection. My only complaint as a customer has been support response and that is only recently with the last couple support cases I have opened.
  • We receive very few incidents of SPAM in our user mailboxes. Looking at reports, you can see the service is doing its job.
  • Coming up with innovative products, like TAP. This was a great addition to really clamp down on suspect attachments.
  • MY only gripe is response time to incident requests.
The product works for us, we have a large email footprint and it does a great job.
Rich Curtis | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use Proofpoint email protection to filter all inbound and outbound email for the corporation worldwide. As opposed to our previous mail filter solution, Proofpoint is able to stop all malware, viruses, and nearly all spam. Additionally, we heavily use the impostor detection feature. Our executives are very commonly impersonated in an attempt to gain gift cards or other goods. Proofpoint has been able to drastically reduce these attacks.
  • Impostor detection
  • Virus detection
  • Malware prevention
  • The cost is significantly higher than other similar products on the market.
  • The administrative interface can be difficult to use. There is no search function and it can be browser-specific.
In our case, the biggest payoff is impersonation and phishing detection. Due to our industry, we are victim to a wide variety of phishing attacks. These include attempts to solicit fraudulent payments, gain customer information, or purchase gift cards to give to the attacker. Proofpoint has been able to drastically reduce these incidents. Some attacks still get through, but they are manageable with end-user training.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use Proofpoint Email Protection to relay both inbound and outbound email with email filtering, malware, and spam protection. This also adds visibility to the email traffic for the entire company.
  • Anti-spam filtering
  • Malware protection
  • Imposter rejection
  • Email firewall rules could be more straightforward.
  • The admin interface could use more polishing.
If a company uses a self-hosted email solution i.e. Exchange server on-premises, then making Proofpoint your MX is a perfect example of how one could benefit from using this technology. More self-contained or competing solutions like Microsoft online email solutions with their own email protection would be a stretch to implement. Well, maybe for inbound traffic, and even that would be redundant.
August 12, 2019

My Proofpoint Review

Mallinath Doddamani | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
It has been used across the whole organization to protect us against spam and unwanted suspicious emails from the internet.
  • It identified the spam or mails which are malware, then classified them as quarantined or discarded.
  • It helps the end-user to allow/block externals users. Users can add a sender to a safe list or block list.
  • It provides the end-user the option to release emails that are blocked.
  • It would be good to have a stand-alone application instead of a web-based portal for the admin console.
  • It should ask for confirmation from admin/user before save or delete operations like Microsoft applications.
  • Admin should be able to open a ticket via the same portal, like the Office 365 portal.
Really, it is a great product.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use Proofpoint Email protection across our entire organization. Its primary use case is to defend against malicious emails including phishing and ransomware, for which it has done an absolutely outstanding job. Phishing was a huge risk and point of concern for our business, and since implementing Proofpoint, it is no longer a primary concern for our security team. The solution is mature, robust, and extremely effective. The reporting is clear and concise, and we provide this to the senior management team so that they can see the evidence of what the solution is protecting us from.
  • Rewriting of links in emails to send users through a proxy: extremely effective at blocking malicious links in emails
  • Attachment sandboxing: attachments are "detonated" in a sandbox and analyzed
  • Anti-Spam: extremely effective spam filtering
  • Maturity: very mature and feature rich solution which can address a variety of needs
  • User interface could be modernized, though it is effective/well organized
  • In some cases, there are small delays in the arrival of emails. Perhaps back-end performance could be upgraded for faster processing by Proofpoint
It is extremely well suited for any organization that is targeted by phishing, ransomware and other attacks via email. Organizations who handle sensitive information such as financial, medical or personal information, in particular, could very much benefit from Proofpoint. It is less appropriate in cases of certain cloud-based email vendors where a competing solution may be involved, for instance, if your organization uses Office365 and also uses the O365 Advanced Threat Prevention Module (which costs extra) then there would be some degree of feature overlap with Proofpoint. Having seen both in action, however, the Proofpoint solution is more robust in my opinion.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We are using one cloud Proofpoint Email Protection instance for the whole group of about 6 companies. We wanted a better product for email protection, as our previous product was very limited in customization and we felt the protection could be better. Though Proofpoint Email Protection is not cheap, it does the job so much better. Though the basic core functionality is just to block malicious/unwanted email, the risk of having such email being delivered warrants investing in a good product.
  • Email filtering: it does the core functionality really well.
  • Reporting: the standard reports are numerous and are a big help for both administrators and management. I have not found a need for a custom report not on the default list yet.
  • Manageability & easy web administration. Use of user digests so people can manage their own spamfolder and report false positives is efficient
  • Customization via custom rules can be as specific as you want.
  • FN/FP reporting is a bit of a hassle.
  • Though training options are good, you should actually follow some training to get the extra benefits of the product to manage it better.
  • The admin GUI is not modern looking. Though a minor issue, it could help in administration.
Using it for email filtering is a very appropriate scenario. You don't want any email threat (virus/phishing) or distraction (spam) to get to the user inbox. Proofpoint Email Protection does this very well (not perfectly, but that would be very hard).
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint Email Protection is used across the entire organization. It is the cornerstone for our email security capabilities and ties into advanced email protection. Its functionality is discussed in detail in our security awareness program.
  • Blocks malicious email.
  • Enables users to better identify suspicious email.
  • Reduces the overall susceptibility of a security issue.
  • Is not fully integrated with newly acquired Wombat capabilities (e.g., two plug-ins vs. one).
  • The email digest feature is not easily configurable and is not pretty or easy to use.
It simply is the best email protection system a company can get. We currently use it with internally hosted email and will use it when we migrate to externally hosted email.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use Proofpoint Email Protection across our whole company to protect our users from getting malware, viruses, spoofed emails, phishing emails, etc. We use Office 365 as our backend email system and it works seemlessly with it. Before getting Proofpoint Email Protection we used to get tons of phishing emails and spoofed emails but 99% of those have stopped since implementing it.
  • Can send daily emails to users showing what emails got caught in their individual spam quarantine
  • Very extensive search engine to search for emails sent/received
  • Easy to block or allow emails in the system
  • It seems there are too many options to let you block or allow emails. It is easy to do still but can be confusing as there are like 5 different places you can do it so maybe simply that somehow.
  • Make an easy way to block email names vs their email address, for example if the email name says Joe Smith but the address says sweet1@hotmail.com when it should be joe.smith@yourcompany.com there should be an easy way to block that kind of email.
  • When doing searches for emails, the from address a lot of times looks weird, different than what you searched for. For example you searched for an email from bobsmith@gmail.com but the from field in the search results may say emailsender101138383093@email.server.number2113.org which is confusing.
I'd say it's well suited for medium to large businesses for sure. For a small office you could definitely get by with just using Office365/Exchange transport rules to block many bad messages. Plus with with a small business you will definitely not be getting the vast amount of message traffic as you would in a large business to justify the cost. However for med/large business it's a no brainer as it's helped a lot.
July 30, 2019

Pro-Proofpoint!!

Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use Proofpoint Enterprise Email Filter, Tap and TRAP. Have had really good experience with Support and implementation and have seen really good results in protection. TRAP has came in handy as well, love it.
  • Prevents Phishing
  • Rewrites bad URL links in emails
  • SPAM
  • Admin User interface is ugly
  • regular health checks up for your cuastomers
  • send SWAG to guys that implemented it
Not sure where it would not be suitable
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use this for our entire organization. Primary requirements for bringing it in was for data loss prevention (DLP) and to meet client and regulatory requirements. We also leverage this platform for e-mail protection against spam and phishing attacks.
  • SaaS service is very resilient and stable.
  • Reporting and protection is good.
  • Data loss prevention (DLP) is very flexible and accommodates our needs..
  • Custom rules, routing policy, and processing of email meeting a wide array of needs.
  • Additional/deeper integration with other security technology.
  • Integration between Wombat (phishing campaign tool) and EM.
The entire suite meets many enterprise needs. The challenge is the over all-suite cost/pricing and comparisons with competitors like Microsoft O365.
Andrew Maledy | TrustRadius Reviewer
Score 1 out of 10
Vetted Review
Verified User
Incentivized
We use it to filter spam. We aren’t using it for much more really and aren’t getting much value beyond that.
  • Stop spam
  • That is literally it
  • Our users hate how they can’t see URLs in emails
  • We don’t like that our users can’t release their own emails
Scenarios where Exchange is hosted on-prem or no other options are available.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We are utilizing the Proofpoint's hosted appliance as our primary email protection for spam, malware, and other threats. Information Technology deployed this across our entire organization as a reactive step due to issues related to phishing. The Proofpoint engineering team worked with us on a weekend to ensure we were able to implement and remediate the attack that was occurring.
  • Proofpoint allows us granular control in routing email to our end users.
  • The end-user digest feature allows users to get a nice report every morning of all of their bulk junk mail. They get to decide if they want to release and read a message.
  • Proofpoint has a powerful machine learning system that scores attacks in order to stop new and unknown threats.
  • The web portal could definitely be rewritten to make it more user-friendly. It is a bit antiquated and clunky. Needs an HTML 5 overhaul.
  • Work could be put into making it easier to find options. Again, the interface needs overhauled.
  • Initial installation could be streamlined with simpler documentation and assistance in understanding what features should be taken advantage of in Proofpoint vs. Office 365 from a security perspective.
Appropriate: If you are a business that has recently migrated to Office365 and is struggling to gain control over your email security with the built-in tools. Also, if you are a lean IT department and can't manage email security and juggle your other commitments. Less Appropriate: If you are a small shop with a minimal budget, you can fine-tune Office365 security settings instead of deploying Proofpoint. Be aware that it will take much of your time to do it.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Our Proofpoint Email Protection is being used agency-wide. It does a great job at categorizing and quarantining SPAM and malicious emails. The easy to use interface allows our Service Desk folks to manage most end-user requests while the rock-solid operations of the appliance allows administrators to 'set and forget' it. We also use it as an SMTP relay for our computer systems to send email through. Our occasional use of their technical support has been exceptional. Usually, it's not to fix an issue but a 'how do you configure it to do this?' They are very helpful and timely. I recommend Proofpoint as a company as well as the Email Protection appliance.
  • Our experience with ProofPoint has been great. They achieve that fine line between false positives and false negatives.
  • The Smart Search feature turns cryptic logs into an easy to search interface that our Service Desk uses to troubleshoot email delivery issues (ie is the issue before the ProofPoint appliance or after with the Exchange environment).
  • It gives us the flexibility to allow a subset of users to receive .zip files while others are quarantined but releasable.
  • I haven't run across any areas that need improving.
The Proofpoint Email Protection appliance is well suited for the front door to your email system. It will protect you from the wild wild web while also protecting you when your user's accounts get compromised and send out SPAM or malicious emails. I don't know how many times it has kept us off the Black Lists.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint Email Protection is utilized across the entire organization. We utilize multiple services from Proofpoint. E-mail encryption ensures that external e-mails are encrypted by a simple keyword in the subject line. DLP ensures no confidential information leaves the organization without being encrypted. TAP and TRAP are utilized to rewrite URLs and test all attachments in the cloud.
  • Proofpoint provides adequate details for good analysis. It's all in one place.
  • It blocks spam and other unwanted e-mails very well (depending on your configuration).
  • Great overall monitoring and alerting system.
  • Very dependable.
  • Smart search limits you to 2,000 results.
  • E-mail protection, TAP, and TRAP dashboards do not have same layout.
  • Proofpoint should integrate all of their services into one portal so that TAP, TRAP, DLP dashboards are in the same portal.
Proofpoint Email Protection is great for investigating suspicious e-mail(s) that were delivered to multiple users, investigating e-mail(s) sent by internal users, and ensuring e-mail encryption on all e-mails containing confidential data (DLP solution). We utilize it as part of incident response where we need to know the details of incoming e-mails. Who clicked on the link, who opened the file and so on.
Return to navigation