Skip to main content
TrustRadius
Proofpoint Email Protection

Proofpoint Email Protection

Overview

What is Proofpoint Email Protection?

Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities ensure…

Read more
Recent Reviews

TrustRadius Insights

Proofpoint Email Protection is widely used across organizations for its robust capabilities in email encryption, URL protection, and virus …
Continue reading

Proofpoint Email Protection Review

9 out of 10
August 30, 2020
We use Proofpoint for all our inbound and outbound email protection. We have stopped spam from entering our network. Typically users do …
Continue reading

Great tool

9 out of 10
August 14, 2020
Incentivized
Proofpoint Email Protection is being used by us as an email gateway kind of thing. It filters and gets rid of unwanted emails (SPAM and …
Continue reading

Protection at its best

9 out of 10
December 18, 2019
Incentivized
It is being used across the whole organization; it helps in blocking suspicious URLs and helps us in keeping safe from phishing campaigns. …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 7 features
  • Anti-malware (76)
    10.0
    100%
  • Customizability (75)
    10.0
    100%
  • Threat Detection (75)
    9.0
    90%
  • Management Tools (74)
    8.0
    80%

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Proofpoint Email Protection?

Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

55 people also want pricing

Alternatives Pricing

What is FileWall?

odix - a provider of Enterprise CDR (Content Disarm and Reconstruction), is now offering its own native application for securing Microsoft Office 365 mailboxes. CDR technology is a detection-less method to disarm zero-days and Windows Defender (formerly APT)’s in files, that the vendor says is…

What is MX Layer?

MX Layer is an enterprise security company based in the United States, focusing on providing cloud-based solutions for email security, business continuity, data loss prevention and email archiving services. MX Layer aims to ensure that their comprehensive email security platform protects company's…

Return to navigation

Features

Secure Email Gateway

Secure email gateway software prevents the transmission of emails that contravene company policy or contain malware, phishing attacks, spam or other unwanted emails

9.2
Avg 8.4
Return to navigation

Product Details

What is Proofpoint Email Protection?

Proofpoint Email Protection is available as an on-premise or cloud based solution and blocks unwanted, malicious and impostor emails with granular search capabilities and visibility into all messages. Outbound controls include encryption and data loss prevention, while continuity capabilities ensure business communications can continue as normal in the event of an email outage.
With Proofpoint's Email Protection, you can protect your people, data, and brand from today’s threats with:
  • The ability to detect BEC or malware-free threats using our machine learning impostor classifier (Stateful Composite Scoring Service)
  • Nearly unlimited email routing capabilities utilizing our advanced email firewall.
  • Robust reporting and email tracking/tracing using Smart Search.
  • TAP, DLP and Encryption built into the same console providing a single pain of glass for management purposes.
  • Unwanted email management that allows users to decide which emails they would like to see in their inbox.

Proofpoint Email Protection Features

  • Supported: Ability to detect BEC or malware-free threats using our machine learning impostor classifier (Stateful Composite Scoring Service)
  • Supported: Nearly unlimited email routing capabilities utilizing our advanced email firewall.
  • Supported: Robust reporting and email tracking/tracing using Smart Search.
  • Supported: TAP, DLP and Encryption are built into the same console providing a single pain of glass for management purposes.
  • Supported: Unwanted email management allows users to decide which emails they would like to see in their inbox.

Proofpoint Email Protection Video

Proofpoint Email Protection: Protecting Against Impostor Email Threats

Proofpoint Email Protection Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationNo
Supported CountriesUnited States, Canada, United Kingdom, Germany, France, Italy, Australia, Japan
Supported LanguagesArabic, Bulgarian, Chinese (Simplified), Chinese (Traditional), Czech, Danish, Dutch, English, Finnish, French, German, Greek, Hebrew, Hindi, Hungarian, Indonesian (Bahasa), Italian, Japanese, Kazakh, Korean, Malay, Norwegian, Polish, Portuguese (Brazilian), Romanian, Russian, Sinhala, Slovak, Spanish, Swahili, Swedish, Tamil, Thai, Turkish, Ukrainian, Urdu, Vietnamese

Proofpoint Email Protection Downloadables

Frequently Asked Questions

Cisco Cloud Email Security, Symantec Encryption, and Mimecast Advanced Email Security are common alternatives for Proofpoint Email Protection.

Reviewers rate Anti-malware and Customizability highest, with a score of 10.

The most common users of Proofpoint Email Protection are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(211)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Proofpoint Email Protection is widely used across organizations for its robust capabilities in email encryption, URL protection, and virus scanning. Users have praised the software for its granular control over inbound and outbound email, allowing for detailed overview and management. The software effectively filters all incoming and outgoing emails, surpassing the capabilities of previous mail filter solutions by significantly reducing malware, viruses, and spam. One notable feature that users appreciate is the impostor detection, which has proven to be highly effective in reducing attacks targeting executives for gift cards and other goods.

Proofpoint seamlessly integrates with Office 365, offering an added layer of protection by preventing phishing and spoofed emails from reaching users. It acts as a primary spam filter, providing daily digests of filtered mail to users. For clients who prefer not to operate a dedicated email gateway, Proofpoint serves as a shared service, delivering robust perimeter defense for all email traffic. The software's ability to block communication based on domain, content, and malicious sites or links has proven successful in stopping the spread of malicious phishing content. Overall, Proofpoint Email Protection serves as a dependable email gateway that protects both inbound and outbound email users from malicious threats while efficiently minimizing spam and junk emails.

Granular control of inbound and outbound email: Users have been impressed with the granular control offered by Proofpoint for managing both inbound and outbound email. Several reviewers have mentioned that they appreciate the ability to configure rules for mail, which allows them to tailor their email management according to their specific needs.

Extensive spam detection capabilities: Many users have praised Proofpoint's extensive spam detection capabilities. They have mentioned that the software is highly effective in detecting and stopping spam, with some stating that it can detect and stop around 99% of spam. This feature has been greatly appreciated by reviewers as it helps maintain a clean inbox.

End-user services and reduced administrative work: Reviewers have highlighted the end-user services provided by Proofpoint as a major advantage. They mention that these services greatly reduce administrative work as users are able to create their own filters and release their own mail. This self-service capability not only saves time but also empowers users to manage their emails effectively.

Confusing and Cumbersome User Interface: Users have found Proofpoint's user interface to be confusing and cumbersome, requiring extra steps and making it difficult to perform tasks quickly. Some users suggest that the UI should be improved for better understanding and easier access to all features. They find the GUI interface confusing and not easy to navigate, with abysmal default settings that make it challenging to effectively filter out unwanted messages. The layout of the email protection, TAP, and TRAP dashboards has been mentioned as inconvenient, prompting users to express a desire for a more modern-looking and streamlined user interface.

Difficulties in Validating DKIM Initiation: Some users have encountered difficulties when trying to validate DKIM initiation with Proofpoint. They find the configuration consoles and options provided by Proofpoint a bit complicated, leading to confusion. As a result, they express the need for more in-depth rule customization options beyond what is currently offered.

Troubleshooting and Support Issues: Users have expressed dissatisfaction with troubleshooting and support for Proofpoint, stating that it is not straightforward. Some users have experienced unresponsiveness from the support team, encountering long wait times for resolution without receiving acknowledgement when certain components or features do not function as expected. The cluttered support portal filled with outdated information makes it difficult for them to find documentation. To improve support and case resolution, users suggest having a TAM or CSM available. Additionally, some users feel that customer support can be too generic and unhelpful at times, recommending the addition of a chat-bot assistant for better understanding of software features and issue resolution.

Attribute Ratings

Reviews

(26-50 of 95)
Companies can't remove reviews or game the system. Here's why
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We implemented the Proofpoint solution approximately 18 months ago. It has proved to be invaluable. We use it institution wide and have been very pleased. The imposter prevention module alone prevented a great number of potential threats. We spend much less time putting out fires because Proofpoint is working so well. We had an excellent implementation team who took the time needed to maximize deployment and ensure our understanding of the product. Support is prompt to respond when needed.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
We are currently using the Proofpoint suite across our entire campus. Proofpoint has proven to be a wonderful tool for alerting us when a malicious or phishing email comes in. We are most appreciative that it is so much easier to pull the messages by using the smart search feature. Also the automatic pulling and quarantining the message.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
First, we tested Proofpoint with one of the company domains, and then it was implemented across the entire organization. The problems encountered were simple, for example, emails from our customers were cataloged as spam, Proofpoint was making more advanced inspections of the files, the Proofpoint sandbox delayed the arrival of emails, the AdQueue folder was not known and it was thought that they were missing posts.
October 22, 2019

Proofpoint Rocks

Jane Updegraff | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use Proofpoint as our primary perimeter defense for all email traffic. Inbound email goes first to Proofpoint's servers for checking and then once vetted by Proofpoint, email goes to our on-premise Exchange servers for distribution. Proofpoint also rewrites all URLs contained in emails so that users cannot open URLs without them being tested in a Proofpoint sandbox first.
Manoj Rana | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint is used to protect our email communication. Proofpoint is used in our whole organization as a gateway server for mailing. Proofpoint does a good filtering mail which reduced the number of cyberattacks and also allows us to add some exceptions to mail filtration. That way, we can allow secure mail to be delivered to our users without it getting blocked by Proofpoint.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Our Proofpoint Email gateway is our first and strongest layer of protection against today's advanced world of phishing and malware, helping defend our entire organization from business email compromise threats. Having previously worked with other technologies, there is no question, in my opinion, that Proofpoint is the clear leader in email protection.
Score 8 out of 10
Vetted Review
Verified User
Incentivized

It is being used throughout the organization. We use various features like TAP, TRAP. It is efficient and the global updates help in minimizing threats.

Sometimes it behaves weirdly in reporting FP due to which quarantined legitimate emails. We are planning to use PP to directly connect applications to send emails to clients especially for marketing purposes.

Keith Krus | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use Proofpoint for email protection. We use Office 365 to host email, and ProofPoint alongside with Office 365 across our entire organization and we have been able to reduce virus, spam, and malware emails by over 95%. The biggest security threats we encounter nowadays are sent via email and Proofpoint is able to help protect us.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We are using it as an internal SMTP gateway between our customers' applications and digital senders, and our end-users or application-serviced customers. We selected Proofpoint Email Protection in part to meet a DKIM stamping need driven by adoption of a DMARC policy as mandated on all USG Executive Branch domains two years ago. We also needed to replace our prior system due to McAfee's departure from this product space. We also use other Proofpoint SaaS products in our email eco-system, and while no vendor has perfect products ( i wouldn't have a job if IT solutions were perfect...) my experience is that Proofpoint's support teams work towards meeting our business needs.
September 11, 2019

Proofpoint Rules!

Score 9 out of 10
Vetted Review
Verified User
Incentivized
We are using it to align security practices and provide protection from email threat vectors. Proofpoint is used across most of the organization. There are some outliers that are not protected by Proofpoint. It serves to protect many protected resources from access due to malware and virus outbreaks. It addresses users unknowingly hitting links and or attachments within the email system.
Score 9 out of 10
Vetted Review
Verified User
Incentivized

We are using Proofpoint Email Protection across our whole organization to filter out spam, bulk, viruses and unwanted email from ever getting to our end-users. We are using it for inbound and outbound mail flow.

Score 10 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint Email Protection is being used across the whole of the corporation. We are filtering and inspecting both inbound and outbound email. Proofpoint has proven to be very beneficial for our organization. It is allowing us to eliminate the majority of spam email, which is in great abundance. We are also capturing any offensive language and malicious content that may be very well hidden inside email containers. Without Proofpoint, our users would be flooded with spam and malicious emails that could possibly bring our productivity to a halt. While we are far from being a fortune 500 company, we are never-the-less intercepting over one hundred and fifty thousand emails per week. In addition, Proofpoint customer service is outstanding. With high-level knowledge and quick response times, they always provide help and assistance when needed.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use Proofpoint Email Protection across the whole organization. It is used to scan all incoming email into the organization to filter out spam and potential threats based on preset rules we configured. We also use Proofpoint to encrypt any internal and outgoing emails. Having the ability to setup rules for the email firewall makes it really easy to manage what comes in and goes out of our organization and quarantine and the logs that Proofpoint provides gives us a simple and easy to use way to see what exactly is being blocked, at what time and who the intended receivers would have been. If something gets quarantined by mistake, it is just as easy to forward the message on to the intended user.
Return to navigation