TrustRadius: an HG Insights company
Proofpoint Intelligent Compliance Logo

Proofpoint Intelligent Compliance Reviews and Ratings

Rating: 8.3 out of 10
Score
8.3 out of 10

Community insights

TrustRadius Insights for Proofpoint Intelligent Compliance are summaries of user sentiment data from TrustRadius reviews and, when necessary, third party data sources.

Business Problems Solved

Proofpoint Intelligent Compliance is a powerful software that provides numerous use cases for organizations looking to ensure corporate and regulatory compliance while streamlining their investigative review process. With its intelligent misconduct detection capabilities, users have reported significant improvements in identifying and addressing misconduct promptly. The software's ability to supervise digital communications has been widely praised by customers, who find it invaluable for protecting against compliance breaches. Additionally, the Phishing Simulation tool offered by Proofpoint helps organizations train their employees on better cybersecurity practices, enhancing their overall security posture. The email archiving feature has also been highly beneficial, allowing users to retain emails for up to six years, providing them with easy access to personal archives and granting supervisors necessary access when required. By offering email and information protection features such as email firewall scanning, content limitations through rule creation, and outgoing email encryption, Proofpoint ensures a secure communication environment. Customers have found these features instrumental in safeguarding against malicious links and phishing attempts. The software's robust archiving and compliance capabilities are utilized organization-wide, offering each user a personal portal for easy access to archived data. Proofpoint's ability to maintain contracts, agreements, and customer correspondence has proven instrumental in meeting regulatory requirements. Another notable advantage of implementing Proofpoint is the reduction in inbox storage space and improved system performance reported by users. Overall, Proofpoint Intelligent Compliance offers a comprehensive suite of features that address critical compliance needs while enhancing organizational security and efficiency.

Reviews

6 Reviews

A Useful Tool for Privacy-Focused Organizations.

Rating: 9 out of 10
Incentivized

Use Cases and Deployment Scope

We use Proofpoint Intelligent Compliance in order to bolster our in-house Cybersecurity Training and train our employee base on better Cybersecurity practices. We utilize the Phishing Simulation tool most often but have recently started to use Proofpoint's available training resources and videos as additional learning material regarding phishing and general good practices.

Pros

  • Phishing Simulation.
  • Having a variety of Training content.
  • Updating the content of the tools regularly.

Cons

  • Implementing a lot of the custom features requires calls to Proofpoint support.
  • Cost of the tool is quite pricey.
  • The Phishing Simulation tool interface could be updated for easier use.

Likelihood to Recommend

Proofpoint Intelligent Compliance is well suited for organizations with a large amount of employees, in my opinion, as they have a lot of options for grouping users in various ways to send specific learning content to them. For a smaller organization, the employees might utilize all of the built-in training videos, phishing simulations, and content more rapidly, which would not justify the pricey cost of the tool.

Vetted Review
Proofpoint Intelligent Compliance
5 years of experience

Proofpoint Intelligent Compliance - An end-to-end protection for your digital communications

Rating: 8 out of 10
Incentivized

Use Cases and Deployment Scope

There was lots of misconduct in our organization, and we need to make it streamline by using a software and then we implement the Proofpoint Intelligent Compliance. It is working well and intelligently detect misconduct in a second and having the capability to reduce the time of investigation review. It is a nice protection at user level end-to-end.

Pros

  • Detecting misconduct
  • Manage data in unified and compliant way
  • End-to-end protection

Cons

  • Proofpoint Archive needs to be fine tunned
  • Automate has to be more advance. M/L needs to upgrade
  • Immutable data store needs to work well in all environments

Likelihood to Recommend

Our organization using MS-Team as a common collaborative platform and during the communication, it is most important to achieve the protection with highest level of investigation and supervision. We have been succeeded to measure and detect the misconduct after implementation of Proofpoint Intelligent Compliance. But If you are using non-standard collaboration client, then it will not help as much as you want.

Proofpoint Intelligent Compliance. Save yourself the time and effort and choose the right product the first time.

Rating: 8 out of 10
Incentivized

Use Cases and Deployment Scope

It is used to supervise a vast array of digital communications for corporate and regulatory compliance protection.

Pros

  • Communications management and control
  • Communications captures
  • Retain communication in full fidelity

Cons

  • We reviewed multiple products and Proofpoint Intelligent Compliance checked all the boxes.
  • Nothing lacking for our use cases.

Likelihood to Recommend

Proofpoint Discover.It offers advanced features to help streamline your e-discovery workflow and reduce related costs. With case management features, your teams can collaborate and track case progress seamlessly.

Proofpoint at a glance

Rating: 8 out of 10
Incentivized

Use Cases and Deployment Scope

We use Proofpoint primarily for email archiving for all users for the retention period of 6 years. Users are allowed to view their personal archives and we can also give access to other user archives for use cases such as an employee leaving our institution and their supervisor needing access to any ongoing email strings, including attachments. We also utilize Proofpoint's email and information protection. This includes an email firewall, allowing us to scan and allow or quarantine all emailing coming into our exchange server, and creating rules that limit what can be sent to and from our user emails. We also utilize Proofpoint's secure mail feature to encrypt all outgoing external emails. Lastly, we utilize Proofpoint's targeted attack protection as another line of defense with the email firewall to scan all incoming emails to quarantine and re-write malicious links and phishing attempts targeted at our users.

Pros

  • Email archiving. Being able to access, on the fly, your entire email archive. Being able to filter by date, sender, attachment, etc. It can get really granular and is able to pull up records fast.
  • Targeted Attack Protection for all incoming emails. Having the ability to automatically scan, quarantine, or re-write URLs within emails. Comparing incoming emails to potential phishing attempts already seen by other institutions.
  • Email encryption & automatic encryption are based on certain rules set up on the firewall. e.g. automatically encrypt outgoing email if it has an attachment or contains a string of numbers that may be personal information.

Cons

  • Email archiving is part of a hosted solution, meaning if something on Proofpoint's end goes down, it can lead to extended downtime. We've had times when our users were unable to access their archives for hours in a day. Proofpoint is good about communicating when outages occur though.

Likelihood to Recommend

If you want an easy-to-implement solution with fast results for your end-users, I think Proofpoint checks the boxes. Although our institution personally experiences downtimes here and there, we are in a timezone far behind the rest of the United States where we would be affected by things most other institutions would not notice. But if 100% uptime is something you need, you would probably want to look for something hosted in-house instead of in the cloud. Their archiving feature is solid and easy to use from an end-user perspective. Firewall and archive is easy to manage from an admin perspective and once you have the basics set up, it's really just adding any new users and giving them the appropriate permissions to have access to the archive and any other Proofpoint features your institution might have access to, like secure share or email encryption.

Vetted Review
Proofpoint Intelligent Compliance
5 years of experience

Proofpoint Archiving and Compliance has positives and negatives.

Rating: 5 out of 10
Incentivized

Use Cases and Deployment Scope

Our entire organization is using Proofpoint Archiving and Compliance. It is nice how the email addresses tie to the Active Directory account for the user and act as a smart archive with a personal portal. It allows us the ability to grant access to each user their own archives, so if they accidentally deleted an email or realized later on that they need it, they can retrieve it from their own personal portal.

Pros

  • Mapping emails to specific users allow it to be organized and accessible to each end user.
  • SSO makes it easy for end users to log in and view their archives.

Cons

  • The end-user interface is lacking in appeal/aesthetics and is not that intuitive. I have seen archive solutions that don't work very well have a better interface than this. I think the interface can be prettied up quite a bit.
  • The admin interface is lacking in features and is not intuitive. It has more capabilities than the previous archives I've used, but utilizing these features is a little complicated without demos or being walked through it.
  • We have had a lot of accounts not map properly. Apparently, there is a limit as to how many errors can be outstanding before you run into issues because all the emails tied to those issues are "queued" waiting for a home (and there is a storage limit for that). I have to set a reminder to check that periodically and resolve the issues manually.

Likelihood to Recommend

It is great if you want to allow your end-users to have access to their own permanent archive. If they have access to this archive, they don't need to retain as many emails in their mailbox. This does two things:

<blockquote>1) For those admins concerned with storage limits, the users can confidently delete emails and maintain a smaller profile and

2) If they are deleting more emails, there are less emails available to attackers in the case of an account compromise.

</blockquote>I know #2 is a small chance of happening, but it does happen and seems to be the #1 goal of attackers nowadays to compromise an account.

Vetted Review
Proofpoint Intelligent Compliance
1 year of experience

Great tool for Archiving

Rating: 8 out of 10
Incentivized

Use Cases and Deployment Scope

We deal in an industry that is highly regulated and all contracts and agreements need to be maintained for years. Along with that our customer correspondence is of huge value and Proofpoint allows us to archive our communications and insure we have our bases covered should anything happen. It has helped us lower our inbox storage space as well which not only frees up space but has improved performance of our system overall.

Pros

  • Easy of saving
  • Look back or search function is great for finding old files

Cons

  • user interface, Proofpoint looks like a dated system
  • update emails, could use a better frequency

Likelihood to Recommend

Proofpoint has been awesome for us dealing with the archiving and saving of emails in a high volume environment. We have 700 employees that are all receiving hundreds of emails a day and we need them all to be recorded and retrievable. Proofpoint allows us to do just that and know everything is at our fingertips.

Vetted Review
Proofpoint Intelligent Compliance
3 years of experience