Skip to main content
TrustRadius
Proofpoint Email Protection

Proofpoint Email Protection

Overview

What is Proofpoint Email Protection?

Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities ensure…

Read more
Recent Reviews

TrustRadius Insights

Proofpoint Email Protection is widely used across organizations for its robust capabilities in email encryption, URL protection, and virus …
Continue reading

Proofpoint Email Protection Review

9 out of 10
August 30, 2020
We use Proofpoint for all our inbound and outbound email protection. We have stopped spam from entering our network. Typically users do …
Continue reading

Great tool

9 out of 10
August 14, 2020
Incentivized
Proofpoint Email Protection is being used by us as an email gateway kind of thing. It filters and gets rid of unwanted emails (SPAM and …
Continue reading

Protection at its best

9 out of 10
December 18, 2019
Incentivized
It is being used across the whole organization; it helps in blocking suspicious URLs and helps us in keeping safe from phishing campaigns. …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 7 features
  • Anti-malware (76)
    10.0
    100%
  • Customizability (75)
    10.0
    100%
  • Threat Detection (75)
    9.0
    90%
  • Management Tools (74)
    8.0
    80%

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Proofpoint Email Protection?

Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

55 people also want pricing

Alternatives Pricing

What is FileWall?

odix - a provider of Enterprise CDR (Content Disarm and Reconstruction), is now offering its own native application for securing Microsoft Office 365 mailboxes. CDR technology is a detection-less method to disarm zero-days and Windows Defender (formerly APT)’s in files, that the vendor says is…

What is MX Layer?

MX Layer is an enterprise security company based in the United States, focusing on providing cloud-based solutions for email security, business continuity, data loss prevention and email archiving services. MX Layer aims to ensure that their comprehensive email security platform protects company's…

Return to navigation

Features

Secure Email Gateway

Secure email gateway software prevents the transmission of emails that contravene company policy or contain malware, phishing attacks, spam or other unwanted emails

9.2
Avg 8.4
Return to navigation

Product Details

What is Proofpoint Email Protection?

Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities ensure business communications can continue as normal in the event of an email outage.
With Proofpoint's Email Protection, you can protect your people, data, and brand from today’s threats with:
  • The ability to detect BEC or malware-free threats using our machine learning impostor classifier (Stateful Composite Scoring Service)
  • Nearly unlimited email routing capabilities utilizing our advanced email firewall.
  • Robust reporting and email tracking/tracing using Smart Search.
  • TAP, DLP and Encryption built into the same console providing a single pain of glass for management purposes.
  • Unwanted email management that allows users to decide which emails they would like to see in their inbox.

Proofpoint Email Protection Features

  • Supported: Ability to detect BEC or malware-free threats using our machine learning impostor classifier (Stateful Composite Scoring Service)
  • Supported: Nearly unlimited email routing capabilities utilizing our advanced email firewall.
  • Supported: Robust reporting and email tracking/tracing using Smart Search.
  • Supported: TAP, DLP and Encryption are built into the same console providing a single pain of glass for management purposes.
  • Supported: Unwanted email management allows users to decide which emails they would like to see in their inbox.

Proofpoint Email Protection Video

Proofpoint Email Protection: Protecting Against Impostor Email Threats

Proofpoint Email Protection Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationNo
Supported CountriesUnited States, Canada, United Kingdom, Germany, France, Italy, Australia, Japan
Supported LanguagesArabic, Bulgarian, Chinese (Simplified), Chinese (Traditional), Czech, Danish, Dutch, English, Finnish, French, German, Greek, Hebrew, Hindi, Hungarian, Indonesian (Bahasa), Italian, Japanese, Kazakh, Korean, Malay, Norwegian, Polish, Portuguese (Brazilian), Romanian, Russian, Sinhala, Slovak, Spanish, Swahili, Swedish, Tamil, Thai, Turkish, Ukrainian, Urdu, Vietnamese

Proofpoint Email Protection Downloadables

Frequently Asked Questions

Cisco Cloud Email Security, Symantec Encryption, and Mimecast Advanced Email Security are common alternatives for Proofpoint Email Protection.

Reviewers rate Anti-malware and Customizability highest, with a score of 10.

The most common users of Proofpoint Email Protection are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(211)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Proofpoint Email Protection is widely used across organizations for its robust capabilities in email encryption, URL protection, and virus scanning. Users have praised the software for its granular control over inbound and outbound email, allowing for detailed overview and management. The software effectively filters all incoming and outgoing emails, surpassing the capabilities of previous mail filter solutions by significantly reducing malware, viruses, and spam. One notable feature that users appreciate is the impostor detection, which has proven to be highly effective in reducing attacks targeting executives for gift cards and other goods.

Proofpoint seamlessly integrates with Office 365, offering an added layer of protection by preventing phishing and spoofed emails from reaching users. It acts as a primary spam filter, providing daily digests of filtered mail to users. For clients who prefer not to operate a dedicated email gateway, Proofpoint serves as a shared service, delivering robust perimeter defense for all email traffic. The software's ability to block communication based on domain, content, and malicious sites or links has proven successful in stopping the spread of malicious phishing content. Overall, Proofpoint Email Protection serves as a dependable email gateway that protects both inbound and outbound email users from malicious threats while efficiently minimizing spam and junk emails.

Granular control of inbound and outbound email: Users have been impressed with the granular control offered by Proofpoint for managing both inbound and outbound email. Several reviewers have mentioned that they appreciate the ability to configure rules for mail, which allows them to tailor their email management according to their specific needs.

Extensive spam detection capabilities: Many users have praised Proofpoint's extensive spam detection capabilities. They have mentioned that the software is highly effective in detecting and stopping spam, with some stating that it can detect and stop around 99% of spam. This feature has been greatly appreciated by reviewers as it helps maintain a clean inbox.

End-user services and reduced administrative work: Reviewers have highlighted the end-user services provided by Proofpoint as a major advantage. They mention that these services greatly reduce administrative work as users are able to create their own filters and release their own mail. This self-service capability not only saves time but also empowers users to manage their emails effectively.

Confusing and Cumbersome User Interface: Users have found Proofpoint's user interface to be confusing and cumbersome, requiring extra steps and making it difficult to perform tasks quickly. Some users suggest that the UI should be improved for better understanding and easier access to all features. They find the GUI interface confusing and not easy to navigate, with abysmal default settings that make it challenging to effectively filter out unwanted messages. The layout of the email protection, TAP, and TRAP dashboards has been mentioned as inconvenient, prompting users to express a desire for a more modern-looking and streamlined user interface.

Difficulties in Validating DKIM Initiation: Some users have encountered difficulties when trying to validate DKIM initiation with Proofpoint. They find the configuration consoles and options provided by Proofpoint a bit complicated, leading to confusion. As a result, they express the need for more in-depth rule customization options beyond what is currently offered.

Troubleshooting and Support Issues: Users have expressed dissatisfaction with troubleshooting and support for Proofpoint, stating that it is not straightforward. Some users have experienced unresponsiveness from the support team, encountering long wait times for resolution without receiving acknowledgement when certain components or features do not function as expected. The cluttered support portal filled with outdated information makes it difficult for them to find documentation. To improve support and case resolution, users suggest having a TAM or CSM available. Additionally, some users feel that customer support can be too generic and unhelpful at times, recommending the addition of a chat-bot assistant for better understanding of software features and issue resolution.

Attribute Ratings

Reviews

(1-25 of 70)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We currently use Proofpoint Email Protection across our entire organization. After having this product for about 2 years and seeing how many threats it stops, I cannot see us not having it! I particularly love the granularity in being able to create very specific rules to ensure unwanted emails are blocked, while still allowing valid ones to be delivered. I can create rules based off of specific email headers, even "user-defined" headers. This is a fantastic product and we have always received prompt responses when we have engaged support.
  • Offers very granular rule creation for SPAM detection.
  • Email Firewall rules allow you to outright stop emails before the even get to a mailbox.
  • Ability to implement DMARC, DKIM, and SPF is great.
  • Would prefer a few more color choices for the dashboard (like a color picker rather than just preset colors).
  • Want ability to resize columns in Email Protection and System tabs.
  • Want additional fields available to filter by for the Firewall rules (such as Message headers).
Proofpoint Email Protection works very well to help us block unwanted emails (malware, SPAM, etc). We have been able to create email firewall rules to simply drop unwanted emails without notifying the sender. This is a great feature to stop unwanted messages, but without letting the sender know that they were rejected.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Our entire organization uses Proofpoint as a email filtering and malware blocking tool for daily email flow. Proofpoint Email Protection helps our organization to stay better protected from malicious actors by providing state-of-the-art spam, virus and malware protection for our staff and students across the entire school district.
  • Proofpoint thoroughly inspects each mail message for suspicious content.
  • Proofpoint provides minimal effort to graft into any organization's email flow.
  • Proofpoint is highly sophisticated, providing extremely granular features for email management.
  • Proofpoint could offer more frequent training opportunities to customers at all levels of expertise.
  • Proofpoint can always continue to strive to keep its product a leader in the industry.
  • Proofpoint's support site could be overhauled to provide a more logical flow.
Proofpoint has an amazing line of products! I consider them to be the next-generation email firewall for organizations. The environment is highly tunable to suit nearly any scenario that malicious actors might throw at it!
Score 10 out of 10
Vetted Review
Verified User
We were using Microsoft Office 365 ATP for a year before switching to Proofpoint. The product is more expensive but it does a much better job than ATP in filtering the emails. Quarantine digest is fantastic and our users love it. Proofpoint assisted us with the initial setup and administration has been easy since. It is used across our whole organization.
  • Email filtering
  • Quarantine Digest
  • Threat dashboard
  • Nothing in particular. We are happy with the product.
Nicole Dohrman | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use ProofPoint across our entire organization. This prevents a lot of malicious, spam, and junk emails from reaching our business units.
  • Customization of email firewall rules allows for detailed prevention of specific attacks.
  • Email Fraud Defense portal gives very detailed authentication information and errors to our team as we work toward full DMARC compliance.
  • The ability to insert email warning tags at the ProofPoint level prevents additional O365 mail flow rules.
  • The administrative portal is a little complex. Would like to see a more "user friendly" portal to find everything we need.
  • When creating email firewall rules, we have to manually move the rule up using the arrows into the position we want it. Would like to specify the position in the rule stack during creation.
  • When finding emails in smart search, it would be ideal to take action on the emails in the same search area rather than clicking on the email, redirecting to the quarantined folder, then having the option to take action.
ProofPoint Email Protection is very well suited for companies that consider email functionality and communication to be critical business functions. It allows for the prevention of email-based attacks and security forward rule sets that are not available in O365 or Exchange alone.
Score 9 out of 10
Vetted Review
Verified User
We use Proofpoint for all our inbound and outbound email protection. We have stopped spam from entering our network. Typically users do not receive spam and if they do they sometimes send it to the support desk letting us know one got through. Some users have been here 15 to 20 years so you know their email address has been out in the wild for a while. It is a great product and one I recommend.
  • Rate and stop spam based on the rating
  • Allow us to block email from countries that we do not work in
  • Encrypt our email coming in and out of the domain
  • Proofpoint has many options that you pay for. If you do not need the option then you do not need to pay for it, but it does help to know what is available as an option.
  • Proofpoint has a cloud service and an on-premises one. We currently just use the on-premises service and do not know anything about the cloud offering.
  • Cost is high with some of the options.
Proofpoint Email Protection is a plug-and-go solution. You can also configure Proofpoint if needed. In other words, you can forget about the service or tweak the server to your heart's content. If you are a smaller shop you may want to use something like Office 365's email protection.
August 14, 2020

Great tool

Score 9 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint Email Protection is being used by us as an email gateway kind of thing. It filters and gets rid of unwanted emails (SPAM and Phishing) that users receive all the time.
It's a pretty good application that learns with time to improve even more the protection it provides users with, making the experience better as it goes.
  • Filters emails users receive
  • Allows users to quarantine and send suspicious emails for further analysis
  • Allows users to move emails to a low priority inbox, so if they receive an email and it's not suspicious but the user don't want have that in their mailbox, they cant check on that later.
  • Implementation was a bit confusing for users, not a big issue though.
Proofpoint Email Protection is well suited for a huge variety of companies that struggles with unwanted emails or can be considered a potential phishing target. Even small companies that use email to communicate would be a good fit, the only scenario where I don't Proofpoint Email Protection being really a must is for self-employers who may use a different email client with protection features included.
Score 5 out of 10
Vetted Review
Verified User
It is being used by Email and Security teams to protect both our on premise and cloud-based email. We use email protection, TAP, and TRAP. We monitor and encrypt outgoing sensitive data through DLP capabilities and detect and block incoming phishing and malware.
  • Ability to create logical and detailed DLP rules.
  • Ability to encrypt or block based on rules.
  • Integration with Active Directory works as expected.
  • Manual Report exports are very limited in row size.
  • There is no search feature for AD groups and users within DLP rule creation.
  • Each email can only be part of one folder, so it can only trigger one monitoring rule.
  • Because of #3, we have to order rule priority. This has to be done in a very manual way with upward and downward arrows. They cannot be ordered by typing in numbers. The page refreshes and goes to the top with every arrow click, and it's pretty slow to update each time.
  • The User Interface is pretty lacking visually.
  • We have to create a rule in both Email Protection and Information Protection to use Active Directory groups in the rule.
It works well for actual functionality of the DLP detection. It does has good dictionaries and identifiers built in. But most of the things involved in the UI are pretty cumbersome and not very visually appealing. There are many extra steps needed to get some things working as desired, and you have to prioritize every monitoring rule.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We are using it at the front of our organization's email. It is applied to all accounts across the organization. We use it to help identify and flag malicious and marketing emails as well as use the tools to encrypt emails that have sensitive data going out of our doors.
  • Allows for the quarantine of emails so that we have the ability to review and release emails if we deem that they are in fact legit. Some of our legit emails look spammy so the quick ability to view and release those emails is helpful.
  • With TAP having the ability to try and automatically remove emails from the inbox if it is a know bad e-mail is a lifesaver, especially during after-hours.
  • I love Tap, but the fact that it can only pull from the user's inbox is an issue with automated rules!
  • I would love to see automation uses the password in the email on the attachments to open them and find the bad emails so that Tap can remove them instead of passing them on because the attachment could not be opened.
Because we are in the financial sector many of our legit emails can look like scam emails. The intelligence feeds that we can take advantage of from Proofpoint gives us an advantage. The tools give us an easy to parse dashboard for deeper dives of real or perceived threats.
December 18, 2019

Protection at its best

Score 9 out of 10
Vetted Review
Verified User
Incentivized
It is being used across the whole organization; it helps in blocking suspicious URLs and helps us in keeping safe from phishing campaigns. It has also helped us in handling spam filtering smartly.
  • Content Blocking
  • Email ID blocking
  • While sending alerts for clicking on malicious URL by any of the user, it should also block it
  • Sandboxing

I would like to highlight points for which I find it well suited for the organization:

1)It has really helped us in categorizing the priority of alerts received from SIEM by integrating it in feeds

2) It has really reduced the phishing attacks rate.

Fraser Clark | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint is being used across our sister companies and we have an admin in each of the countries.
It is our main email security tool and is used by all of our users.

We were in need of a product that could handle higher volumes of email traffic and Proofpoint regularly features as one of the top email security products. It addresses many of the issues we were having with email security, some we didn't even realize we had. It has helped us get a very detailed overview of our email. We have extremely granular control of our inbound and outbound email.
  • Granular control of inbound and outbound email.
  • The rules that can be configured for mail are extremely impressive. An example is that you could configure rules so that if your CEO sends an email that cannot create a TLS link with the receiving MTA, then it will reinject the mail into the queue and send it again with encryption configured.
  • To ensure emails are never sent over plain text. This is but one of the examples.
  • Spam detection is amazing. Proofpoint can detect and stop around 99% of spam and this is shown in the reporting available.
  • End-user services are fantastic and cut down on admin work greatly.
  • End-users can create their own filters, release their own mail and also get end-user digests so they can see all mail that has been delivered to them.
  • The pricing is high and there are many licenses for things I feel should be part of other products.
  • The UI is slightly dated and has a lot of room for improvement.
  • The separate products should have one pane of glass for administration. Currently, if you own several of the products it feels quite disjointed when using them.
In mid-large companies, this is an excellent solution, especially if you require complex filtering. Perhaps due to regulatory reasons or maybe different departments require different rulesets. This is where Proofpoint excels in my opinion, the granularity is mind-blowing.
Companies with very large inbound & outbound mail flow are also where Proofpoint will excel.

In smaller companies that don't require the complex options that Proofpoint offers is where I would recommend a different product. Especially if they do not get large amounts of mail or aren't doing bulk sends.
Score 6 out of 10
Vetted Review
ResellerIncentivized
It is performing email security throughout the entire business. It has numerous operating brands and many different SMTP domains. The customisation available with Proofpoint allows unique branding and policies per operating company which is very valuable.
  • Strong security filtering. We've not had significant threats get past Proofpoint.
  • Customisation is strong. There are lots of options for unique policies.
  • Mail routing has lots of options with powerful rules engine.
  • Directory synchronisation configuration is clunky.
  • General administration, specifically the UI is quite poor. Making changes is not intuitive at all.
  • Terminology used by Proofpoint is not standard with other competing products so things can be confusing.
So far I've found it is suitable for large orgs with complex requirements. For smaller orgs, I find the administrative burden and complexity to be too much.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint is being used across our whole organization. All inbound and outbound mail is protected by Proofpoint. We have been using it for about 4 years now and we are very satisfied with the results. It has done a great job of preventing viruses, phishing, impostor emails, etc.
  • Virus protection has been excellent. I cannot remember the last time an email related virus entered our company.
  • The impostor protection within Proofpoint has done a great job of preventing phishing emails.
  • We use Proofpoint for DKIM email signing for outbound mail. Very easy to configure and test.
  • Proofpoint is in the process of refining their admin UX. This will be a big improvement to their current admin UX.
  • They need to work on linking up their various portals so that you do not need to sign into 3 different portals to access your admin consoles.
  • Their working relationship with Microsoft's Office 365 support could be improved. Currently, I have to open tickets with both vendors and play the middle man negotiating fixes.
Proofpoint Email Protection is easily implemented. It does a great job at protecting your email. It has a number of features not found in O365.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use Proofpoint (PP) across our entire domain and have several domains covered by it. PP is our main source of spam, virus, and malicious code protection for attacks coming in from emails.
  • PP does a good job filtering spam or malicious content emails.
  • PP has a good reasonably easy user interface for the end user's management of their spam accounts.
  • PP has a robust management interface for administers to create special rules for exceptions to mail rules.
  • In some areas, PP is difficult to set up or identify how to set up custom rules. Or if they are set up it's not always easy to find what you are looking for.
  • The UI for administrators when doing a smart search is not always pretty. If there are multiple recipients the UI may stretch out far across the screen making it difficult to see what you want to see. It would be better if they wrapped that column so the results column didn't go so far off the page.
  • Common features should be first on the list when using the UI. For example, when you click user management, then Users are last in the dropdown. Settings which are hardly ever used is first. So when you click on User Management it causes you to have to scroll down further. I spend most of my day clicking and scrolling, any time you can reduce or eliminate time doing that is well worth it.
I think PP is good for medium to larger companies. Although it can be a bit slow at times so I don't know if it would work so well for a really large company. Also, you would need to have a competent IT staff capable of knowing how to configure a complex product and also know a lot about how email works in general.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint Email Protection is being used throughout the organization for email security and spam filtering. We rely on Proofpoint's expertise in email security and threat analysis to stop our users from receiving malicious attachments, excessive spam, and being phished. Proofpoint offers the "right" amount of customization to the platform, but works quite well "out of the box".
  • Recognizing spam and blocking it from coming into end user's email inboxes.
  • Threat analysis on new email threats and how to block it.
  • Customization to continually add/remove rules to strengthen our email security perimeter.
  • I think they could improve their administration GUI.
  • I think that they need/will continue to improve their threat analysis and database upkeep of "bad" IPs.
  • They need to add more functionality and the ability to "tie-in" to Office 365 GCC High.
I think Proofpoint is a great fit for almost any size company. I love the option to have Proofpoint host and manage the cluster for us, and we can just focus on adding/removing security features that we see our company in need of. I don't think Proofpoint is the correct fit for very small companies, but anyone that is looking to expand their email security should look into this product.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We have implemented it across the organization. It helps secure us from spam, malware, phishing and social engineering.
  • URL Redirection is one of the best feature to stop users from opening any unknown URL and spread a virus.
  • Policies to stop malware and phishing attack.
  • Can do better in stopping spam
Can create a more customized solution based on TAP dashboard reports for your email protection. It can work better on email phishing and malware.
Score 8 out of 10
Vetted Review
Verified User
Incentivized

Proofpoint Email Protection helps Advent stop both malware and non-malware threats, including imposter emails and Business Email Compromise (BEC) attempts.

This email filtering service has been good, and Proofpoint's uptime has been stellar in the 5 years we've utilized the product.

  • Highlights BEC attempts
  • Blocks malware
  • Granting access to Proofpoint's management console is a real pain in the butt.... You have to email support with the individual user names, emails and phone numbers, and then Proofpoint sends them a link for required user training, and access isn't granted until they've completed the training.
Sometimes emails with malicious links get through, and Proofpoint doesn't realize they're malicious until a few hours later. So now you have bad content already sitting in user mailboxes that wasn't previously blocked...
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use Proofpoint in our Cyber Defense team not across all the organisation. As it is used to protect the unwanted traffic from being communicated to our organisation's users. We use Proofpoint to block communication based on the domain, the content of the mail, malicious site, or link present in the mail. For example if I learned that some malicious content (for example a malicious phishing site) in being spread using the mail in our organisation we reach out to Proofpoint to block the content of the mail being communicated to our users with the help of Proofpoint (in cases that it's the same in all the mail). We also use the domain being used to send the mail to our users (we used to attach a sample mail for better understanding of content). According to the priority of the case they take desired action. So ultimately it helps to stop any malicious phishing content from being spread across our organisation and protect all the users being targeted of such unwanted content from the web. Once a site is being blocked by Proofpoint it will not be accessible to the organisational user if if they clicked on it accidentally.
  • When a bulk of unwanted mail start triggering against your organisation and removing them from web in an instant node is not possible, Proofpoint help as an instant measure to stop such flow.
  • In case, when something malicious being spread in your organisation and you want user to remain uninfected even after clicking on the malicious link, Proofpoint proves as a major solution as it prevent blocked domains to be open by any user.
  • It also act as an AD-HOC measure when you have to know in advance about some threat and you have the IOC of the threat you can add that in advance in block lost in Proofpoint. That helps to prevent any future harm to the organisation.
  • UI can be improved for better and easy understanding of all features.
  • They should have a chat-bot type assistant for better understanding of all its features and easy understanding while raising or working on any issue by the user.
  • AI might help to improve threat hunting and make it more useful for a security organisation, Where using AI Proofpoint suggest a number of existing threat list to organisation. Help in pro-active steps to stop being targeted by any malicious content over the web.
A very useful and beneficial application for almost all of the organisation operating over the web as being on the web means being in danger to get phished or spoofed, to safeguard a large number of user base it is required to have Proofpoint so one can easily block a content that proves harmful for the whole organisation. Can be blocked using Proofpoint within minutes. A number of times we have scenarios where hackers are trying to get the user spoofed using false content and send a large number of emails to almost all users. If our organization at that time reached out to all the users to stop them from being targeted from the mail - it seemed impossible. So we use Proofpoint to get the malicious content inaccessible for anyone in the organisation.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We implemented the Proofpoint solution approximately 18 months ago. It has proved to be invaluable. We use it institution wide and have been very pleased. The imposter prevention module alone prevented a great number of potential threats. We spend much less time putting out fires because Proofpoint is working so well. We had an excellent implementation team who took the time needed to maximize deployment and ensure our understanding of the product. Support is prompt to respond when needed.
  • Deployment was excellent. With over 25 years experience of working with vendor assisted deployments, I will say this was definitely one of the smoothest I every experienced.
  • The imposter prevention module is an excellent tool that saves lots of time.
  • I love the smart search functionality.
  • TAP Dashboard is definitely a favorite feature.
  • I would like the smart search section to have a message preview area.

Proofpoint email protection is very well suited for our environment. They continue to build on the technology and its use has greatly reduced the time it takes to manage malicious mail, search for messages, and contain threats. The daily digest is also a great feature that allows end users to decide for themselves what messages they want or do not want to receive.

From a protection standpoint, I can't think of a scenario where Proofpoint is not appropriate.

Score 7 out of 10
Vetted Review
Verified User
Incentivized
We are currently using the Proofpoint suite across our entire campus. Proofpoint has proven to be a wonderful tool for alerting us when a malicious or phishing email comes in. We are most appreciative that it is so much easier to pull the messages by using the smart search feature. Also the automatic pulling and quarantining the message.
  • The ease of use of the system. The initial setup can be daunting but once it is up and running it practically runs itself.
  • The quick response from Proofpoint when an email that was sent to a mailbox but was later found to be malicious.
  • One thing I like is the fact that if we pull an email which later turns out to be good we are then able to un-quarantine the messages, either a few or all.
  • The ease of use of the smart search feature. This makes putting together a CSV file to use in TRAP to pull messages from mailboxes on campus much easier than having to run a exchange PowerShell to remove mail from mailboxes, especially when you have multiple exchange servers
  • Search feature
  • Easier location to block URLS and or email addresses
  • Unable to locate emails which have been quarantined
Using Proofpoint email protection helps assist in our daily routine of ensuring our email system is safe and secure. The feature where it pulls emails from the user's email accounts and displays to us whether the email was read or unread helps us in determining if a user needs to have further training.
Kote Sudhakar | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Healthcare client is using Proofpoint Protection Server and we manage the complete environment of email security.
  • It’s customisable and policy based.
  • Management interface is user friendly.
  • It’s dynamic.
  • I am happy with whatever is provided.
It’s suitable for all types of industry from small-scale to enterprise.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use Proofpoint Email Protection to protect our emails from malicious content coming into the organization. We also use it for DLP on outgoing emails.
  • Good email protection and spam filtering
  • Easy search for identifying emails coming in
  • DLP protection has customization options to fit business needs
  • Until you get to know why sections and config options are in a certain area it seems random and confusing.
  • It would be better if it interacted with their other products more smoothly.
  • Customizing the spam filtering can take a little while to dial in.
Well suited:
Proofpoint does a pretty good job at protecting us from spam emails. I was able to block a lot of emails coming from SendGrid by blocking SendGrid emails with a custom spam filter. However, SendGrid has a lot of legit emails too so I was able to create another rule to allow those emails from certain people, then block the rest. That way business need was met but spam emails are blocked.

Less Appropriate
If you are trying to monitor internal to internal emails Proofpoint is probably a little over featured for that.
October 22, 2019

Proofpoint Rocks

Jane Updegraff | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use Proofpoint as our primary perimeter defense for all email traffic. Inbound email goes first to Proofpoint's servers for checking and then once vetted by Proofpoint, email goes to our on-premise Exchange servers for distribution. Proofpoint also rewrites all URLs contained in emails so that users cannot open URLs without them being tested in a Proofpoint sandbox first.
  • Proofpoint does a nearly perfect job of rewriting URLs in emails to our users. They can very rarely click on a link that does NOT go to a Proofpoint sandbox URL.
  • Proofpoint does a fantastic job of detecting "imposter" emails where the sender is attempting to impersonate a C-level officer for the purpose of fraud. All we had to do was tell it which names to look for as "sender" and match up the sender display name with the sender email address. when there is a mismatch, Proofpoint re-directs the email straight to our MIS team and the recipeitn doesn't even see it.
  • Proofpoint does a very good job of identifying email-transported threats. We often get notified immediately that an end user has received a malicious email and even when it is a zero-day threat, they generally notify us within minutes of the nature of the threat.
  • I think that Proofpoint could potentially speed up their identification of certain kinds of threats. Other than that i can't think of anything, they are just that good.
I think Proofpoint is probably the best perimeter email defense out there. The only area that could potentially improve is their cumbersome GUI on their portal pages. It's hard to navigate. But once you get used to it, it does everything that you could ask for it to do.
Jorge Golvano | TrustRadius Reviewer
Score 7 out of 10
Vetted Review
Verified User
Incentivized
We use it across the whole organization nationwide.
  • Spam detection
  • Phishing prevention
  • Virus detection
  • Management interface
  • False positive reporting
  • System performance
It's a very good filtering solution but not without its problems and issues, especially their so-called cloud implementation which is nothing more than an appliance with storage and performance limitations.

The configuration is very detailed, but at the same time it's not very intuitive and some things are very hard to set up.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Currently, we use Proofpoint to scan emails for our faculty and staff only. It addresses many issues that we have experienced in the past, such as impostor detection and phishing type emails.
  • The product has been stable since we deployed it. It updates regularly with minimal downtime.
  • It provides a easily to navigate interface for for users in regards to viewing/releasing their quarantined items
  • Proofpoint's spam detection is second to none. It is a little aggressive at times, but false positives are often remedied.
  • The support team is great and responds quickly to any issue that arises.
  • I scan the quarantine folders everyday for false positively caught email. I report the FPs that I find to Proofpoint support (everyday), but unfortunately there are always items to release.
  • I wish that there was a method to run a health check on the server without the need for support to login
Proofpoint Email Protection is well suited for a medium on-premises email deployment. I do not have any experience with the cloud-based offering.
Manoj Rana | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint is used to protect our email communication. Proofpoint is used in our whole organization as a gateway server for mailing. Proofpoint does a good filtering mail which reduced the number of cyberattacks and also allows us to add some exceptions to mail filtration. That way, we can allow secure mail to be delivered to our users without it getting blocked by Proofpoint.
  • Mail filtration: Proofpoint has its own algorithm but we still can create a rule for mail flirtation.
  • Organizational blacklist: We can block domains, SMTP addresses, or any IP.
  • Inbound mail: Only added or authorized domain mail will be passed by ProofPoint to the internal mail server.
  • Quarantine: This is a good feature which allows us to control the blocked mail and if we feel mail id good, then we can take the action.
  • Spam: Spam detection is also good.
  • Quarantine storage: We receive lots of emails and we feel the storage capacity of Proofpoint is lacking. We cannot keep the mail in the quarantined folder for more than a week.
I feel that wether the company is mid-level or enterprise and require any complex mail filtering, then ProofPoint is best. Again, each department has its own requirements related to mail rules, so ProofPoint plays a very good role in these scenarios. For a small organization, I don't think they require any complex filtering and cost is a big factor.
Return to navigation