Skip to main content
TrustRadius
Proofpoint Targeted Attack Protection (TAP)

Proofpoint Targeted Attack Protection (TAP)

Overview

What is Proofpoint Targeted Attack Protection (TAP)?

Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and…

Read more
Recent Reviews

TrustRadius Insights

Effective URL Blocking: Several users have praised Proofpoint TAP for its effective URL Blocking feature, which has prevented malicious …
Continue reading

Great product!

10 out of 10
November 11, 2021
Incentivized
Currently, at my organization, Proofpoint Target Attack Protection, also known as TAP, is used by the SOC and also our Threat Intelligence …
Continue reading

Proofpoint is AWESOME!

10 out of 10
November 21, 2019
Incentivized
POD TAP is used for email protection. We greatly appreciate the added security and safe feeling it gives us. We are very happy with the …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Proofpoint Targeted Attack Protection (TAP)?

Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

13 people also want pricing

Alternatives Pricing

What is Avanan?

Avanan, from Check Point since the August 2021 acquisition, connects security technologies to enterprise cloud applications in order to improve protection of sensitive corporate data and IP. According to the vendor, Avanan's one-click deployment allows customers to deploy a new security solution in…

What is KnowBe4 PhishER?

PhishER is presented as a lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate threat response and manage the high volume of potentially malicious email messages reported by users. And, with automatic prioritization of emails, PhishER helps InfoSec and Security…

Return to navigation

Product Details

What is Proofpoint Targeted Attack Protection (TAP)?

Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and credential-stealing phishing techniques to obtain sensitive information. TAP seamlessly integrates with the Proofpoint secure email gateway (Proofpoint Email Protection) to deliver best-in-class email security in a way that is cost effective and easy to use. TAP leverages the cloud to scale deployment, adapt analysis and protect people on any network or device.

With Proofpoint Targeted Attack Protection (TAP), you can:

  • Provide sophisticated analysis to prevent threats from getting to a user's inbox.
  • Detect known and unknown threats using adaptable analysis capabilities.
  • Provide security teams detailed analysis and visibility about threats and threat campaigns.
  • Provide visibility into threats targeting the Very Attacked People (VAP) in an organization.

Proofpoint Targeted Attack Protection (TAP) Features

  • Supported: Provide sophisticated analysis to prevent threats from getting to users inbox.
  • Supported: Detect known and unknown threats using adaptable analysis capabilities.
  • Supported: Provide security teams detailed analysis and visibility about threats and threat campaigns.
  • Supported: Provide visibility into threats targeting the Very Attacked People (VAP’s) in an organization

Proofpoint Targeted Attack Protection (TAP) Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(65)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Effective URL Blocking: Several users have praised Proofpoint TAP for its effective URL Blocking feature, which has prevented malicious URLs from infiltrating their systems. This feature not only alerts users about potential compromises but also provides concise threat context, enabling them to understand the nature of the threats they face.

Integration with Proofpoint TRAP: Many reviewers have valued the seamless integration between TAP and Proofpoint TRAP. By combining these two solutions, users are able to streamline their workflow and enhance security measures. The integration detects spam and phishing emails, providing an added layer of protection against cyber threats.

Accurate Attachment Detonation: Users have expressed high satisfaction with TAP's sandbox attachment detonation feature. This functionality effectively vets attachments for threats, allowing users to confidently analyze email attachments without risking system compromise. The ability to detect malicious attachments and boast a false positive rate of less than 0.001% over three years has been particularly impressive to reviewers.

Cumbersome Admin Web GUI: Users have mentioned that the admin web GUI is difficult to navigate and understand, leading to a steep learning curve. Several reviewers expressed frustration with the unclear interface and the need to constantly stay updated on new features.

Lack of Communication on New Features: Users have expressed frustration with Proofpoint's lack of communication when new features are added to their toolbox. Some users felt left in the dark about updates and wished for better transparency from the company.

Difficulty in Automating Custom Report Emails: Several users mentioned the inability to automate custom report emails like with Proofpoint Secure email. This inconvenience makes it time-consuming for administrators who rely on automated reports for efficient management.

Attribute Ratings

Reviews

(1-5 of 5)
Companies can't remove reviews or game the system. Here's why
Tim Slater | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint Targeted Attack Protection is a rock solid application that just works.
  • Anti Spam
  • Anti Malware
  • Upgrades on the on-premise version can sometimes fail to install
Proofpoint Targeted Attack Protection is an extremely robust solution to secure corporate email. It is extremely effective at eliminating anti-spam messages and allows users to manage a digest to access emails that may have been flagged as false positive. The product also is effective at blocking malware in messages. The user management interface is very intuitive and provides a robust medium to configure and administer the product very easily.
  • Proofpoint has been our organizations anti-spam solution for many years with great results
The product does everything that I need, in an interface that is easy to manage.
Proofpoint support is fantastic. The engineers are helpful, friendly and very knowledgeable of the product.
November 21, 2020

TAP away those threats!

Score 10 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint Targeted Attack Protection is used across our entire company covering all email domains.
  • URL rewrite feature is extremely useful for finding users at risk
  • Very attacked people is great for end user awareness targeted training
  • The dashboard is very intuitive and has useful data for reporting efficacy
  • Small issue but it would be great if they got on board with SAML 2.0 authentication for the dashboard
  • Would be nice to combine PPS and TAP dashboards into one view for reporting
TAP is great where you have diverse email solutions and if you have a multi-vendor security strategy. They partner with leading security providers to increase security posture and telemetry.
  • The URL rewrite feature saves incident responders from digging into other tools to find if they are at risk. Easily saves 15-20 minutes of time per incident.
TAP has much more robust feature sets that what we saw in Mimecast. They have also been acquiring companies adjacent to their business that bolsters their products.
Simple to configure and very straightforward dashboard. Within days of implementation, we were using the dashboard to reduce our response time.
Health checks and frequent touchpoints ensure we have our solution optimally tuned.
Score 8 out of 10
Vetted Review
ResellerIncentivized
Proofpoint TAP is used on a shared service mail gateway cluster by our outsourcing services clients. The URL protection prevents users from open websites with malware content. The attachment analyzer is able to detect malware in email content before the mail enters the client's environment and before the standard antispam engine checks the attachment.
  • URL protection with a cloud-based Proofpoint database.
  • Attachment analysis and removal of potentially dangerous content.
  • Support for different languages in international environments for URL protection functions.
Proofpoint TAP works well on the Proofpoint PPS mail gateways and it cooperates with Proofpoint T.R.A.P.
  • It is very expensive and it is hard to sell to clients.
  • There are two functions and both are easy to configure.
  • none
No
After the initial configuration, the TAP System works automatically.
Jerry Robinson | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Targeted Attack Protection (TAP) for Email is used across the entire enterprise. TAP gives us a layer of protection against the numerous attack vectors that exist in the cyberworld.
  • Attachment Defense. This component scans all attachments for malicious content, quarantining anything suspicious. This is a must have for any legitimate email protection product.
  • URL Defense. With so many phishing attempts out there that try to lure the unsuspecting user into clicking a link to a malicious web site, URL Defense provide an invaluable safety net by encoding the URL and re-routing it to Proofpoint's "sandbox". If legitimate, it seamlessly redirects the user to the original URL. Despite your best efforts at education, a percentage of your end users will click the link. Knowing that TAP is sandboxing those links to test for malicious activity is protection we cannot live without.
  • TAP Dashboard. This lets me see who's being targeted in my environment as well as provide metrics that tell me how effective the protection has been. We're able to identify our "VIP's" so that we can receive special alerets whey they come under attack.
  • It's a stretch for me to find something that needs improvement. If I had to put at least one thing it would relate to URL Defense. The process works great but, there are times when you have to decode the encoded URL. Currently, the only place to do that is in the TAP dashboard. To save clicks and logins, it would be nice to have that decode functionality in the Proofpoint management console.
  • No other issues.
I believe TAP is well suited for all scenarios but some organizations may wish to implement part, or all, of TAP for specific departments. That can be done by AD group membership.
  • I believe this has been one of the best protection offerings we have used. It's hard to quantify an ROI on something like this but, at the same time, you cannot put a price on the safety it affords.
We started with Barracuda and it served our purposes well but we outgrew it. The same could be said of Forcepoint. Over time, we simply noticed that more and more of the bad stuff was getting through the filter and, no matter how we tweaked the settings, we couldn't stop it. Proofpoint made an immediate impact. We did a POC with Proofpoint in-line behind Forcepoint and could see how it was catching things that Forcepoint missed every day.
2000
Administration, Support, Clinical
3
Primarily, the ones who support the product have a networking background with a degree of familiarity with how email systems work.
  • Phishing prevention.
  • Anti-malware.
  • Anti-spoofing.
  • There were no unexpected uses for this product.
  • There are no additional ways this product can be used by our organization as it stands today.
Yes
Forcepoint. We replaced it because it simply wasn't working effectively.
  • Price
  • Product Features
  • Product Usability
  • Product Reputation
Features would have to be the most important factor in our decision to purchase Proofpoint. It had all the features we wanted, and then some.
I can't begin to imagine how I would change my process.
  • Implemented in-house
Yes
We implemented inbound protection first, then added outbound protection.
Change management was minimal
The implementation was fairly seamless to the end user so change management was not an issue.
  • The only issues we encountered revolved around us understanding how the product worked; specifically, how it differed from our previous solutions.
Proofpoint managed the installation and made it very simple. We had a dedicated installation engineer who checked in on use periodically after go-live to ensure that there were no issue.
Yes
It was included in our initial purchase.
It is simply the best we have ever used.
Every support request I've had has been satisfactory; but, what I really like is the quarterly heath check that they do to help ensure that I've not made a policy change that will weaken my protection.
  • Spam detection
  • Visus detection
  • Email Firewall
  • Email Authentication
  • Understanding how policy routes and whitelisting works.
No
The system provides a high degree of granularity which makes it complex but, once you grasp the concepts, it is an easy to use system.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint Targeted Attack Protection for Email is being used by our organization to identify malicious email campaigns and which users that it might affect. It is being used across the whole organization, and identifies the VAPs (Very Attacked People) as well as VIP users, to narrow down our focus during an investigation into an incident.
  • Identify whether an email was received or blocked by a user.
  • Identify whether a malicious link in an email was clicked on or not.
  • Listing of the severity of the campaign, as well as the spread (how many other customers were affected).
  • Cloud integration ( in progress).
  • Integrating the GUI with the Email Security Admin portal (instead of two different logins).
Proofpoint Targeted Attack Protection for Email is good for identifying malicious email campaigns, and whether a user might be affected by this (if they clicked any links in the email). We can also see whether this was a broad email campaign or specifically targeted towards our company or a certain industry, or possibly specific users.
  • Decrease investigation time for an incident.
  • Better visibility into our threat landscape.
  • Identify potentially malicious emails that were delivered or blocked.
  • Identifying links in an email that were clicked on (and permitted or not).
  • Identify email campaigns affecting our organization.
It's a useful feature that complements other Proofpoint solutions
No
  • Product Features
  • Product Usability
  • Product Reputation
  • Vendor Reputation
  • Implemented in-house
No
Change management was a small part of the implementation and was well-handled
Pro services team was helpful
Generally have had good response and resolution time with knowledgeable technicians, and if needed the ticket is moved to someone with more expertise to better address the issue. Have used the ticketing portal, phone, as well as the beta chat feature (permanent please!)
No
Proofpoint Targeted Attack Protection for Email has an intuitive interface that is well laid out and had a graphical improvement recently.
Return to navigation