TrustRadius
https://dudodiprj2sv7.cloudfront.net/product-logos/F0/xp/ZI37TT6KDWCX.JPEGProofpoint TAP is Awesome!Proofpoint Targeted Attack Protection (TAP) is guarding against ransomware and defending us with URL filtering to ensure we don't get e-mail messages that could hurt our organization. Over the past year alone we have received several messages from some of the firms we deal with and they were infected with a virus and TAP guarded us against this.,URL Filtering / URL Defense Machine Learning Ransomware Prevention,False Positives,10,Guarding against Ransomware Guarding against fake domains,Our IT and Third-party IT uses TAP to ensure we are protected.,Yes it met our expectations 100%. It has handled past and present attacks and we know it will guard against future attacks. The machine learning portion of TAP is always ensuring our protection.Email's Best DefenseProofpoint Targeted Attack Protection for Email is deployed to our entire email domain. It protects our end users and our network from threats with opening infected attachments (malware) and clicking on phishing emails. This prevents the remediation effort needed to handle situations where users infected their machine and/or network with malware, or fall victim to a phishing attack.,Block phishing sites when users click on malicious links in their emails Block malicious attachments Proofpoint Dynamic Reputation is its machine-learning to learn which IP addresses may be compromised to send spam (like part of a botnet) and block them,The administration interface can be updated with improved navigation. Proofpoint does not recommend saving attachments in quarantine which creates an issue when there are false-positives. We cannot release a false-positive since it is not saved due to affecting performance of Proofpoint product when the database gets too big. It requires a good amount of time and effort to get familiar with Proofpoint system administration.,9,Avoid situations where users clicked on a phishing link in their email Prevent opening an infected or malware attachment which can impact the entire network Provide a much needed IT security strategy,Our leadership team finds the threat insight dashboard report informative and affirming that the Proofpoint product is a necessity to information and network security. Our help desk and support groups finds it useful to gauge what threats are out there. It gives everyone a wake up call that there are many email threats out there and we need to continue to be vigilant in safeguarding our emails, our network and our users.,Yes, it has blocked malware, including ransomware. There were times where ransomware, such as WannaCry, are proliferating on the internet. Our leadership team have heard on the news and wanted to know how we can be protected. We just tell them not to worry because we have Proofpoint Targeted Attack Protection for Email in place.,,Proofpoint Email Encryption, Proofpoint Email Data Loss Prevention, Proofpoint Email Fraud DefenseTAP protection helps users not get tapped by malicious linksWe use Proofpoint Targeted Attack Protection (TAP) company-wide. It solves for us web links that were good at the time the email was sent in, then the website becomes malicious later or is found to be malicious later. TAP identifies and alerts us about the users that have clicked the link that went from good to bad, when they clicked it an how often. That information saves us a ton of wondering who did what, how often and who is affected. It focuses our efforts on the correct people.,Re-evaluates web links on an on-going basis to see if the links were good and have been changed to bad. Identifies specific users and alerts us regarding who clicked the now bad links and were not blocked prior to discovery of malicious code. Gives us the ability to identify VIP users that may be especially vulnerable to attack and take additional action on them.,Proofpoint needs to get a single sign-on for all the different portals.,10,Positive ROI through better use of my technicians - we can determine who clicked any bad links and when. Positive ROI - Even though malicious links that were good became bad - we know we don't have to track down the email users and prevent them from clicking. We can just email them and tell them not to click it and delete it, if they don't - the software protects them anyway.,I've found in IT the insight dashboard to be valuable - we can determine who is getting phished most often and getting the bad links. From there we can target our phishing training and provide more targeted training for those individuals. We can also tell if someone is signing up for nefarious sites or their email has been spread everywhere based on volume coming into them.,It met the bulk of my expectations. In terms of protection - 100% great. The only area I think it falls short is where it gives you statistics on URL's "not re-written". I just haven't figured out what that counter is for. I believe all my URLs are being re-written. Support didn't give me a great answer to that question. I can't imagine NOT using it.,McAfee Email Gateway and Proofpoint Essentials for Small BusinessProofpoint Targeted Attack ProtectionProofpoint Targeted Attack Protection for Email is being used by our organization to identify malicious email campaigns and which users that it might affect. It is being used across the whole organization, and identifies the VAPs (Very Attacked People) as well as VIP users, to narrow down our focus during an investigation into an incident.,Identify whether an email was received or blocked by a user. Identify whether a malicious link in an email was clicked on or not. Listing of the severity of the campaign, as well as the spread (how many other customers were affected). Cloud integration ( in progress).,Integrating the GUI with the Email Security Admin portal (instead of two different logins).,10,Decrease investigation time for an incident. Better visibility into our threat landscape.,The information security operations team finds it valuable because they manage the email security infrastructure (Targeted Attack Protection complements the Email Security and Protection solution).,Proofpoint Targeted Attack Protection for Email does very well to identify advanced email threats that aren't necessarily identified by the Proofpoint Email Security and Protection solution, and in turn is complemented by the Threat Response Auto-pull feature (to remove emails from a user's inbox if it was delivered, but through further analysis deemed actually part of a malicious campaign).,Proofpoint Email Security and Protection, Proofpoint Email Fraud Defense, Proofpoint Threat Response Auto-Pull,Identify potentially malicious emails that were delivered or blocked. Identifying links in an email that were clicked on (and permitted or not). Identify email campaigns affecting our organization.,10,No,Product Features Product Usability Product Reputation Vendor Reputation,Implemented in-house,No,Change management was a small part of the implementation and was well-handled,10,9,No,9A necessity most enterprises can't live without.We utilize Proofpoint's Targeted Attack Protection services to protect our entire enterprise of over 18,000 individuals. One of the highest risk attacks we've been dealing with is that of the ever evolving "phishing" and ransomware/malware type attacks. Proofpoint's services have provided solid protection to our organization minimizing that risk, along with providing us with a high level of insight into the threats.,The URL Defense components having greatly reduced the risk associated with "phishing" attacks and malicious web sites. The Attachment Defense components have also reduced the amount of malware (including zero day type attacks) actually getting to our clients systems. The services are fairly simple to implement and provide enough flexibility to tailor them to address specific security policies. The level of threat analysis is extremely high compared to some of Proofpoint's competitors making this a "goto" product for people who want a solid product to protect their enterprise. The on-going implementation has been extremely stable with minimal service outages. Accuracy is definitely one of Proofpoint's strong points and we have experienced very few false positives.,The only real area that needs improvement is the customer specific definitions for blocked URL's in terms of providing more flexibility in using more specific pattern matching expressions. Pretty certain this will be resolved shortly. Cost is always a factor and given that this type of service is almost a necessity these days, their cost is a bit on the high end.,9,This really boils down to what is the cost to an organization related to data leakage associated with compromised credentials? Phishing attacks continue to be on the rise and are getting increasingly sophisticated. The Proofpoint TAP services provide a solid platform to mitigate this type of threat. Compromised accounts where are the then used for outbound attacks or spamming never look good when they are originating from your domain. How much is one's reputation worth?,Our central IT services manage the services which also includes our central IT security organization. We are routinely evaluating the threat landscape based in the insight dashboard to adjust our security focus as needed.,The Proofpoint TAP services have definitely met our expectations in terms of mitigating malware threats from getting to our enterprise managed systems. Overall we've had a very low occurrence of malware infections since deploying the services.,,Duo Security, Ping Identity Platform
Windows, Linux, Mac
Proofpoint Targeted Attack Protection for Email
9 Ratings
Score 8.4 out of 101
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>TRScore

Proofpoint Targeted Attack Protection for Email Reviews

Proofpoint Targeted Attack Protection for Email
9 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>
Score 8.4 out of 101
Show Filters 
Hide Filters 
Filter 9 vetted Proofpoint Targeted Attack Protection for Email reviews and ratings
Clear all filters
Overall Rating
Reviewer's Company Size
Last Updated
By Topic
Industry
Department
Experience
Job Type
Role

Reviews (1-6 of 6)

  Vendors can't alter or remove reviews. Here's why.
Riccardo Francese profile photo
November 23, 2018

User Review: "Proofpoint TAP is Awesome!"

Score 10 out of 10
Vetted Review
Verified User
Review Source
Proofpoint Targeted Attack Protection (TAP) is guarding against ransomware and defending us with URL filtering to ensure we don't get e-mail messages that could hurt our organization. Over the past year alone we have received several messages from some of the firms we deal with and they were infected with a virus and TAP guarded us against this.
  • URL Filtering / URL Defense
  • Machine Learning
  • Ransomware Prevention
  • False Positives
Proofpoint TAP is seamless to the end-user and continues to work in the background to protect the organization. It is well suited for all organizations big or small; however, false positives can appear.
Read Riccardo Francese's full review
No photo available
January 18, 2019

Proofpoint Targeted Attack Protection for Email Review: "Email's Best Defense"

Score 9 out of 10
Vetted Review
Verified User
Review Source
Proofpoint Targeted Attack Protection for Email is deployed to our entire email domain. It protects our end users and our network from threats with opening infected attachments (malware) and clicking on phishing emails. This prevents the remediation effort needed to handle situations where users infected their machine and/or network with malware, or fall victim to a phishing attack.
  • Block phishing sites when users click on malicious links in their emails
  • Block malicious attachments
  • Proofpoint Dynamic Reputation is its machine-learning to learn which IP addresses may be compromised to send spam (like part of a botnet) and block them
  • The administration interface can be updated with improved navigation.
  • Proofpoint does not recommend saving attachments in quarantine which creates an issue when there are false-positives. We cannot release a false-positive since it is not saved due to affecting performance of Proofpoint product when the database gets too big.
  • It requires a good amount of time and effort to get familiar with Proofpoint system administration.
Proofpoint Targeted Attack Protection for Email is well suited for saving time and resources for IT staff from having to handle situations where users clicked on a phishing link in their email and fall victim to it and opening an infected or malware attachment which can impact the entire network and harm the endpoint device. It saves from potential remediation and clean-up work which can be significant to IT organizations.
Read this authenticated review
No photo available
December 13, 2018

Review: "TAP protection helps users not get tapped by malicious links"

Score 10 out of 10
Vetted Review
Verified User
Review Source
We use Proofpoint Targeted Attack Protection (TAP) company-wide. It solves for us web links that were good at the time the email was sent in, then the website becomes malicious later or is found to be malicious later. TAP identifies and alerts us about the users that have clicked the link that went from good to bad, when they clicked it an how often. That information saves us a ton of wondering who did what, how often and who is affected. It focuses our efforts on the correct people.
  • Re-evaluates web links on an on-going basis to see if the links were good and have been changed to bad.
  • Identifies specific users and alerts us regarding who clicked the now bad links and were not blocked prior to discovery of malicious code.
  • Gives us the ability to identify VIP users that may be especially vulnerable to attack and take additional action on them.
  • Proofpoint needs to get a single sign-on for all the different portals.
I've found it suited to our entire environment. It has proved to be a good layer of protection for email links.
Read this authenticated review
No photo available
December 08, 2018

Proofpoint Targeted Attack Protection for Email Review: "Proofpoint Targeted Attack Protection"

Score 10 out of 10
Vetted Review
Verified User
Review Source
Proofpoint Targeted Attack Protection for Email is being used by our organization to identify malicious email campaigns and which users that it might affect. It is being used across the whole organization, and identifies the VAPs (Very Attacked People) as well as VIP users, to narrow down our focus during an investigation into an incident.
  • Identify whether an email was received or blocked by a user.
  • Identify whether a malicious link in an email was clicked on or not.
  • Listing of the severity of the campaign, as well as the spread (how many other customers were affected).
  • Cloud integration ( in progress).
  • Integrating the GUI with the Email Security Admin portal (instead of two different logins).
Proofpoint Targeted Attack Protection for Email is good for identifying malicious email campaigns, and whether a user might be affected by this (if they clicked any links in the email). We can also see whether this was a broad email campaign or specifically targeted towards our company or a certain industry, or possibly specific users.
Read this authenticated review
No photo available
December 10, 2018

Proofpoint Targeted Attack Protection for Email Review: "A necessity most enterprises can't live without."

Score 9 out of 10
Vetted Review
Verified User
Review Source
We utilize Proofpoint's Targeted Attack Protection services to protect our entire enterprise of over 18,000 individuals. One of the highest risk attacks we've been dealing with is that of the ever evolving "phishing" and ransomware/malware type attacks. Proofpoint's services have provided solid protection to our organization minimizing that risk, along with providing us with a high level of insight into the threats.
  • The URL Defense components having greatly reduced the risk associated with "phishing" attacks and malicious web sites.
  • The Attachment Defense components have also reduced the amount of malware (including zero day type attacks) actually getting to our clients systems.
  • The services are fairly simple to implement and provide enough flexibility to tailor them to address specific security policies.
  • The level of threat analysis is extremely high compared to some of Proofpoint's competitors making this a "goto" product for people who want a solid product to protect their enterprise. The on-going implementation has been extremely stable with minimal service outages.
  • Accuracy is definitely one of Proofpoint's strong points and we have experienced very few false positives.
  • The only real area that needs improvement is the customer specific definitions for blocked URL's in terms of providing more flexibility in using more specific pattern matching expressions. Pretty certain this will be resolved shortly.
  • Cost is always a factor and given that this type of service is almost a necessity these days, their cost is a bit on the high end.
The product is definitely well suited for any type of enterprise e-mail services whether hosted or on-premises. Again, the insight provided by their product and the high level of accuracy in detecting and mitigating threats make this a must have product.
Read this authenticated review
No photo available
November 17, 2018

Proofpoint Targeted Attack Protection for Email Review: "ProofPoint Targeted Attack Protection- The best protection you can buy!"

Score 10 out of 10
Vetted Review
Verified User
Review Source
We are using Targeted Attack Protection (TAP) to supplement the normal spam/viral email detection. TAP rewrites URLs to protect us and notify if a site is weaponized after delivery. Also, if an attachment needs further analysis TAP provides that service. We act on alerts by sending [them] to users and IT administrators to research the problem. Also we regularly use the TAP dashboard to see what is happening in our environment.
  • It is great and alerting us to who has clicked on a URL that could be a problem.
  • Also it prevents sophisticated files that would bypass traditional antivirus.
  • URL writing is a great protection for our users.
  • We have visibility who is hit by any malicious email campaign.
  • Sometimes alerts are hard to read.
  • Automatic removal of messages should be included in the product.
  • It is costly...if it was part of the base product and all email gateway customers the cost should be lower. In the end a C level person doesn't care if a message was stopped (or allowed) because of a separate component.
It protects users from advanced attacks either with files or URLs exceptionally well. I feel like its a mandatory component and wish it was included in the spam/virus product. In a high security company where attachments were blocked it would not be necessary. Overall there are many more positives than negatives from Targeted Attack Protection.
Read this authenticated review

About Proofpoint Targeted Attack Protection for Email

Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and credential-stealing phishing techniques to obtain sensitive information. TAP seamlessly integrates with the Proofpoint secure email gateway (Proofpoint Email Protection) to deliver best-in-class email security in a way that is cost effective and easy to use. TAP leverages the cloud to scale deployment, adapt analysis and protect people on any network or device.

With Proofpoint Targeted Attack Protection (TAP), you can:

  • Provide sophisticated analysis to prevent threats from getting to a user's inbox.
  • Detect known and unknown threats using adaptable analysis capabilities.
  • Provide security teams detailed analysis and visibility about threats and threat campaigns.
  • Provide visibility into threats targeting the Very Attacked People (VAP) in an organization.
Categories:  Secure Email Gateway

Proofpoint Targeted Attack Protection for Email Features

Has featureProvide sophisticated analysis to prevent threats from getting to users inbox.
Has featureDetect known and unknown threats using adaptable analysis capabilities.
Has featureProvide security teams detailed analysis and visibility about threats and threat campaigns.
Has featureProvide visibility into threats targeting the Very Attacked People (VAP’s) in an organization

Proofpoint Targeted Attack Protection for Email Support Options

 Paid Version
Phone
Live Chat
Email
Forum/Community
FAQ/Knowledgebase
Video Tutorials / Webinar

Proofpoint Targeted Attack Protection for Email Technical Details

Deployment Types:On-premise, SaaS
Operating Systems: Windows, Linux, Mac
Mobile Application:No