TrustRadius
https://dudodiprj2sv7.cloudfront.net/product-logos/F0/xp/ZI37TT6KDWCX.JPEGProofpoint TAP is Awesome!Proofpoint Targeted Attack Protection (TAP) is guarding against ransomware and defending us with URL filtering to ensure we don't get e-mail messages that could hurt our organization. Over the past year alone we have received several messages from some of the firms we deal with and they were infected with a virus and TAP guarded us against this.,URL Filtering / URL Defense Machine Learning Ransomware Prevention,False Positives,10,Guarding against Ransomware Guarding against fake domains,Our IT and Third-party IT uses TAP to ensure we are protected.,Yes it met our expectations 100%. It has handled past and present attacks and we know it will guard against future attacks. The machine learning portion of TAP is always ensuring our protection.TAP protection helps users not get tapped by malicious linksWe use Proofpoint Targeted Attack Protection (TAP) company-wide. It solves for us web links that were good at the time the email was sent in, then the website becomes malicious later or is found to be malicious later. TAP identifies and alerts us about the users that have clicked the link that went from good to bad, when they clicked it an how often. That information saves us a ton of wondering who did what, how often and who is affected. It focuses our efforts on the correct people.,Re-evaluates web links on an on-going basis to see if the links were good and have been changed to bad. Identifies specific users and alerts us regarding who clicked the now bad links and were not blocked prior to discovery of malicious code. Gives us the ability to identify VIP users that may be especially vulnerable to attack and take additional action on them.,Proofpoint needs to get a single sign-on for all the different portals.,10,Positive ROI through better use of my technicians - we can determine who clicked any bad links and when. Positive ROI - Even though malicious links that were good became bad - we know we don't have to track down the email users and prevent them from clicking. We can just email them and tell them not to click it and delete it, if they don't - the software protects them anyway.,I've found in IT the insight dashboard to be valuable - we can determine who is getting phished most often and getting the bad links. From there we can target our phishing training and provide more targeted training for those individuals. We can also tell if someone is signing up for nefarious sites or their email has been spread everywhere based on volume coming into them.,It met the bulk of my expectations. In terms of protection - 100% great. The only area I think it falls short is where it gives you statistics on URL's "not re-written". I just haven't figured out what that counter is for. I believe all my URLs are being re-written. Support didn't give me a great answer to that question. I can't imagine NOT using it.,McAfee Email Gateway and Proofpoint Essentials for Small BusinessProofpoint Targeted Attack ProtectionProofpoint Targeted Attack Protection for Email is being used by our organization to identify malicious email campaigns and which users that it might affect. It is being used across the whole organization, and identifies the VAPs (Very Attacked People) as well as VIP users, to narrow down our focus during an investigation into an incident.,Identify whether an email was received or blocked by a user. Identify whether a malicious link in an email was clicked on or not. Listing of the severity of the campaign, as well as the spread (how many other customers were affected). Cloud integration ( in progress).,Integrating the GUI with the Email Security Admin portal (instead of two different logins).,10,Decrease investigation time for an incident. Better visibility into our threat landscape.,The information security operations team finds it valuable because they manage the email security infrastructure (Targeted Attack Protection complements the Email Security and Protection solution).,Proofpoint Targeted Attack Protection for Email does very well to identify advanced email threats that aren't necessarily identified by the Proofpoint Email Security and Protection solution, and in turn is complemented by the Threat Response Auto-pull feature (to remove emails from a user's inbox if it was delivered, but through further analysis deemed actually part of a malicious campaign).,Proofpoint Email Security and Protection, Proofpoint Email Fraud Defense, Proofpoint Threat Response Auto-Pull,Identify potentially malicious emails that were delivered or blocked. Identifying links in an email that were clicked on (and permitted or not). Identify email campaigns affecting our organization.,10,No,Product Features Product Usability Product Reputation Vendor Reputation,Implemented in-house,No,Change management was a small part of the implementation and was well-handled,10,9,No,9A necessity most enterprises can't live without.We utilize Proofpoint's Targeted Attack Protection services to protect our entire enterprise of over 18,000 individuals. One of the highest risk attacks we've been dealing with is that of the ever evolving "phishing" and ransomware/malware type attacks. Proofpoint's services have provided solid protection to our organization minimizing that risk, along with providing us with a high level of insight into the threats.,The URL Defense components having greatly reduced the risk associated with "phishing" attacks and malicious web sites. The Attachment Defense components have also reduced the amount of malware (including zero day type attacks) actually getting to our clients systems. The services are fairly simple to implement and provide enough flexibility to tailor them to address specific security policies. The level of threat analysis is extremely high compared to some of Proofpoint's competitors making this a "goto" product for people who want a solid product to protect their enterprise. The on-going implementation has been extremely stable with minimal service outages. Accuracy is definitely one of Proofpoint's strong points and we have experienced very few false positives.,The only real area that needs improvement is the customer specific definitions for blocked URL's in terms of providing more flexibility in using more specific pattern matching expressions. Pretty certain this will be resolved shortly. Cost is always a factor and given that this type of service is almost a necessity these days, their cost is a bit on the high end.,9,This really boils down to what is the cost to an organization related to data leakage associated with compromised credentials? Phishing attacks continue to be on the rise and are getting increasingly sophisticated. The Proofpoint TAP services provide a solid platform to mitigate this type of threat. Compromised accounts where are the then used for outbound attacks or spamming never look good when they are originating from your domain. How much is one's reputation worth?,Our central IT services manage the services which also includes our central IT security organization. We are routinely evaluating the threat landscape based in the insight dashboard to adjust our security focus as needed.,The Proofpoint TAP services have definitely met our expectations in terms of mitigating malware threats from getting to our enterprise managed systems. Overall we've had a very low occurrence of malware infections since deploying the services.,,Duo Security, Ping Identity PlatformProofPoint Targeted Attack Protection- The best protection you can buy!We are using Targeted Attack Protection (TAP) to supplement the normal spam/viral email detection. TAP rewrites URLs to protect us and notify if a site is weaponized after delivery. Also, if an attachment needs further analysis TAP provides that service. We act on alerts by sending [them] to users and IT administrators to research the problem. Also we regularly use the TAP dashboard to see what is happening in our environment.,It is great and alerting us to who has clicked on a URL that could be a problem. Also it prevents sophisticated files that would bypass traditional antivirus. URL writing is a great protection for our users. We have visibility who is hit by any malicious email campaign.,Sometimes alerts are hard to read. Automatic removal of messages should be included in the product. It is costly...if it was part of the base product and all email gateway customers the cost should be lower. In the end a C level person doesn't care if a message was stopped (or allowed) because of a separate component.,10,Stopped infections. Stopped phishing Increased visibility to email.,The only groups that has access is IT. We forward alerts to users, but only the IT group has access.,It has exceeded our expectations. We had a very poor performing email gateway that didn't do the job very well so I can't compare it to other. Proofpoint is a modern solution that I feel protects our users very well.,Mimecast Secure Email Gateway,Microsoft Exchange, Snagit, LogMeIn Rescue, VMware ESXi, Nutanix
Windows, Linux, Mac
Proofpoint Targeted Attack Protection for Email
7 Ratings
Score 8.3 out of 101
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>TRScore

Proofpoint Targeted Attack Protection for Email Reviews

Proofpoint Targeted Attack Protection for Email
7 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow'>trScore algorithm: Learn more.</a>
Score 8.3 out of 101
Show Filters 
Hide Filters 
Filter 7 vetted Proofpoint Targeted Attack Protection for Email reviews and ratings
Clear all filters
Overall Rating
Reviewer's Company Size
Last Updated
By Topic
Industry
Department
Experience
Job Type
Role
Reviews (1-5 of 5)
  Vendors can't alter or remove reviews. Here's why.
Riccardo Francese profile photo
November 23, 2018

User Review: "Proofpoint TAP is Awesome!"

Score 10 out of 10
Vetted Review
Verified User
Review Source
Proofpoint Targeted Attack Protection (TAP) is guarding against ransomware and defending us with URL filtering to ensure we don't get e-mail messages that could hurt our organization. Over the past year alone we have received several messages from some of the firms we deal with and they were infected with a virus and TAP guarded us against this.
  • URL Filtering / URL Defense
  • Machine Learning
  • Ransomware Prevention
  • False Positives
Proofpoint TAP is seamless to the end-user and continues to work in the background to protect the organization. It is well suited for all organizations big or small; however, false positives can appear.
Read Riccardo Francese's full review
No photo available
December 13, 2018

Review: "TAP protection helps users not get tapped by malicious links"

Score 10 out of 10
Vetted Review
Verified User
Review Source
We use Proofpoint Targeted Attack Protection (TAP) company-wide. It solves for us web links that were good at the time the email was sent in, then the website becomes malicious later or is found to be malicious later. TAP identifies and alerts us about the users that have clicked the link that went from good to bad, when they clicked it an how often. That information saves us a ton of wondering who did what, how often and who is affected. It focuses our efforts on the correct people.
  • Re-evaluates web links on an on-going basis to see if the links were good and have been changed to bad.
  • Identifies specific users and alerts us regarding who clicked the now bad links and were not blocked prior to discovery of malicious code.
  • Gives us the ability to identify VIP users that may be especially vulnerable to attack and take additional action on them.
  • Proofpoint needs to get a single sign-on for all the different portals.
I've found it suited to our entire environment. It has proved to be a good layer of protection for email links.
Read this authenticated review
No photo available
December 08, 2018

Proofpoint Targeted Attack Protection for Email Review: "Proofpoint Targeted Attack Protection"

Score 10 out of 10
Vetted Review
Verified User
Review Source
Proofpoint Targeted Attack Protection for Email is being used by our organization to identify malicious email campaigns and which users that it might affect. It is being used across the whole organization, and identifies the VAPs (Very Attacked People) as well as VIP users, to narrow down our focus during an investigation into an incident.
  • Identify whether an email was received or blocked by a user.
  • Identify whether a malicious link in an email was clicked on or not.
  • Listing of the severity of the campaign, as well as the spread (how many other customers were affected).
  • Cloud integration ( in progress).
  • Integrating the GUI with the Email Security Admin portal (instead of two different logins).
Proofpoint Targeted Attack Protection for Email is good for identifying malicious email campaigns, and whether a user might be affected by this (if they clicked any links in the email). We can also see whether this was a broad email campaign or specifically targeted towards our company or a certain industry, or possibly specific users.
Read this authenticated review
No photo available
December 10, 2018

Proofpoint Targeted Attack Protection for Email Review: "A necessity most enterprises can't live without."

Score 9 out of 10
Vetted Review
Verified User
Review Source
We utilize Proofpoint's Targeted Attack Protection services to protect our entire enterprise of over 18,000 individuals. One of the highest risk attacks we've been dealing with is that of the ever evolving "phishing" and ransomware/malware type attacks. Proofpoint's services have provided solid protection to our organization minimizing that risk, along with providing us with a high level of insight into the threats.
  • The URL Defense components having greatly reduced the risk associated with "phishing" attacks and malicious web sites.
  • The Attachment Defense components have also reduced the amount of malware (including zero day type attacks) actually getting to our clients systems.
  • The services are fairly simple to implement and provide enough flexibility to tailor them to address specific security policies.
  • The level of threat analysis is extremely high compared to some of Proofpoint's competitors making this a "goto" product for people who want a solid product to protect their enterprise. The on-going implementation has been extremely stable with minimal service outages.
  • Accuracy is definitely one of Proofpoint's strong points and we have experienced very few false positives.
  • The only real area that needs improvement is the customer specific definitions for blocked URL's in terms of providing more flexibility in using more specific pattern matching expressions. Pretty certain this will be resolved shortly.
  • Cost is always a factor and given that this type of service is almost a necessity these days, their cost is a bit on the high end.
The product is definitely well suited for any type of enterprise e-mail services whether hosted or on-premises. Again, the insight provided by their product and the high level of accuracy in detecting and mitigating threats make this a must have product.
Read this authenticated review
No photo available
November 17, 2018

Proofpoint Targeted Attack Protection for Email Review: "ProofPoint Targeted Attack Protection- The best protection you can buy!"

Score 10 out of 10
Vetted Review
Verified User
Review Source
We are using Targeted Attack Protection (TAP) to supplement the normal spam/viral email detection. TAP rewrites URLs to protect us and notify if a site is weaponized after delivery. Also, if an attachment needs further analysis TAP provides that service. We act on alerts by sending [them] to users and IT administrators to research the problem. Also we regularly use the TAP dashboard to see what is happening in our environment.
  • It is great and alerting us to who has clicked on a URL that could be a problem.
  • Also it prevents sophisticated files that would bypass traditional antivirus.
  • URL writing is a great protection for our users.
  • We have visibility who is hit by any malicious email campaign.
  • Sometimes alerts are hard to read.
  • Automatic removal of messages should be included in the product.
  • It is costly...if it was part of the base product and all email gateway customers the cost should be lower. In the end a C level person doesn't care if a message was stopped (or allowed) because of a separate component.
It protects users from advanced attacks either with files or URLs exceptionally well. I feel like its a mandatory component and wish it was included in the spam/virus product. In a high security company where attachments were blocked it would not be necessary. Overall there are many more positives than negatives from Targeted Attack Protection.
Read this authenticated review

About Proofpoint Targeted Attack Protection for Email

Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and credential-stealing phishing techniques to obtain sensitive information. TAP seamlessly integrates with the Proofpoint secure email gateway (Proofpoint Email Protection) to deliver best-in-class email security in a way that is cost effective and easy to use. TAP leverages the cloud to scale deployment, adapt analysis and protect people on any network or device.

With Proofpoint Targeted Attack Protection (TAP), you can:

  • Provide sophisticated analysis to prevent threats from getting to a user's inbox.
  • Detect known and unknown threats using adaptable analysis capabilities.
  • Provide security teams detailed analysis and visibility about threats and threat campaigns.
  • Provide visibility into threats targeting the Very Attacked People (VAP) in an organization.
Categories:  Secure Email Gateway

Proofpoint Targeted Attack Protection for Email Features

Has featureProvide sophisticated analysis to prevent threats from getting to users inbox.
Has featureDetect known and unknown threats using adaptable analysis capabilities.
Has featureProvide security teams detailed analysis and visibility about threats and threat campaigns.
Has featureProvide visibility into threats targeting the Very Attacked People (VAP’s) in an organization

Proofpoint Targeted Attack Protection for Email Support Options

 Paid Version
Phone
Live Chat
Email
Forum/Community
FAQ/Knowledgebase
Video Tutorials / Webinar

Proofpoint Targeted Attack Protection for Email Technical Details

Deployment Types:On-premise, SaaS
Operating Systems: Windows, Linux, Mac
Mobile Application:No