Overview
What is Proofpoint Targeted Attack Protection (TAP)?
Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and…
TrustRadius Insights
TAP in my own perspective as a user
Great product!
Spam/Phishing emails reduced significantly
Proofpoint TAP a product that just works!
TAP away those threats!
Proofpoint TAP is powerful but expensive
Email threat protection for loosely connected devices
Proofpoint Targeted Attack Review
Proofpoint is AWESOME!
Proofpoint TAP - Provides another layer to Email Security and is great at it.
Proofpoint Targeted Attack Protection - TAP'in out email threats
Proofpoint Targeted Attack Protection - it works pretty well!
Proofpoint Targeted Attack Protection: A Must For Any Organization's Email System
Proofpoint is at next level
Awards
Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards
Reviewer Pros & Cons
Pricing
What is Proofpoint Targeted Attack Protection (TAP)?
Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized…
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
13 people also want pricing
Alternatives Pricing
What is Avanan?
Avanan, from Check Point since the August 2021 acquisition, connects security technologies to enterprise cloud applications in order to improve protection of sensitive corporate data and IP. According to the vendor, Avanan's one-click deployment allows customers to deploy a new security solution in…
What is KnowBe4 PhishER?
PhishER is presented as a lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate threat response and manage the high volume of potentially malicious email messages reported by users. And, with automatic prioritization of emails, PhishER helps InfoSec and Security…
Product Details
- About
- Tech Details
What is Proofpoint Targeted Attack Protection (TAP)?
Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and credential-stealing phishing techniques to obtain sensitive information. TAP seamlessly integrates with the Proofpoint secure email gateway (Proofpoint Email Protection) to deliver best-in-class email security in a way that is cost effective and easy to use. TAP leverages the cloud to scale deployment, adapt analysis and protect people on any network or device.
With Proofpoint Targeted Attack Protection (TAP), you can:
- Provide sophisticated analysis to prevent threats from getting to a user's inbox.
- Detect known and unknown threats using adaptable analysis capabilities.
- Provide security teams detailed analysis and visibility about threats and threat campaigns.
- Provide visibility into threats targeting the Very Attacked People (VAP) in an organization.
Proofpoint Targeted Attack Protection (TAP) Features
- Supported: Provide sophisticated analysis to prevent threats from getting to users inbox.
- Supported: Detect known and unknown threats using adaptable analysis capabilities.
- Supported: Provide security teams detailed analysis and visibility about threats and threat campaigns.
- Supported: Provide visibility into threats targeting the Very Attacked People (VAP’s) in an organization
Proofpoint Targeted Attack Protection (TAP) Technical Details
Deployment Types | On-premise, Software as a Service (SaaS), Cloud, or Web-Based |
---|---|
Operating Systems | Windows, Linux, Mac |
Mobile Application | No |
Comparisons
Compare with
Reviews and Ratings
(65)Community Insights
- Pros
- Cons
Effective URL Blocking: Several users have praised Proofpoint TAP for its effective URL Blocking feature, which has prevented malicious URLs from infiltrating their systems. This feature not only alerts users about potential compromises but also provides concise threat context, enabling them to understand the nature of the threats they face.
Integration with Proofpoint TRAP: Many reviewers have valued the seamless integration between TAP and Proofpoint TRAP. By combining these two solutions, users are able to streamline their workflow and enhance security measures. The integration detects spam and phishing emails, providing an added layer of protection against cyber threats.
Accurate Attachment Detonation: Users have expressed high satisfaction with TAP's sandbox attachment detonation feature. This functionality effectively vets attachments for threats, allowing users to confidently analyze email attachments without risking system compromise. The ability to detect malicious attachments and boast a false positive rate of less than 0.001% over three years has been particularly impressive to reviewers.
Cumbersome Admin Web GUI: Users have mentioned that the admin web GUI is difficult to navigate and understand, leading to a steep learning curve. Several reviewers expressed frustration with the unclear interface and the need to constantly stay updated on new features.
Lack of Communication on New Features: Users have expressed frustration with Proofpoint's lack of communication when new features are added to their toolbox. Some users felt left in the dark about updates and wished for better transparency from the company.
Difficulty in Automating Custom Report Emails: Several users mentioned the inability to automate custom report emails like with Proofpoint Secure email. This inconvenience makes it time-consuming for administrators who rely on automated reports for efficient management.
Attribute Ratings
Reviews
(26-42 of 42)Happy with Proofpoint TAP.
- Finding threats.
- Reporting.
- Insight into the threats (sandbox results).
- Solve the bug with the TRAP integration.
- Have consistent look & feel with the other Proofpoint products.
Easy to use and accurate threat detection
- Impostor email detection is a fantastic feature and works very well.
- The sandbox feature helps to ensure confidence that their evaluation of the email threat is valid.
- Easy to use (and understand) dashboard make identifying and managing email threats a breeze.
- Occasionally, we have a false positive or false negative, but those are easily corrected.
- Would like the ability to upload a file to have it automatically exploded via sandbox to determine threat.
Proofpoint TAP is on TAP
- Detailed GUI
- Email alerts
- Stops impostor emails
TAP is a must with Proofpoint
- Alert on malware/attacks that made it through, so we can respond.
- Data loss prevention (DLP) is very flexible and accommodates our needs.
- More advancement in the imposter technology.
- Integration between Wombat (phishing campaign tool) and email.
Save your money and find something else
- Slowing down mail flow for scanning.
- Limiting to a specific sub group of your org.
- Sending lots of mail unthrottled by default.
- Stopping bad mail.
- Hashing spam emails in a more efficient way.
- Easy to manage.
- Easy to deploy.
- Proven solution.
- Adoption can be a problem, but only early on.
- It's a carefree solution for automatic approval of (bad) attachments.
- A carefree solution for automatic approval of bad URLs.
- Alerts for admins if the attachments or allowed URL clicks afterwards turned out to be malicious.
- A lot of information about malware campaigns inside the TAP Dashboard, and useful info, like who's the most attacked target in your company.
- Expensive (but justified).
- A lot of German companies are very sensitive about their data and privacy. You have to trust Proofpoint here.
Proofpoint TAP Review
- Block malicious and phishing emails
- Alert of now known to be bad emails
- Threat intelligence for tracking campaigns
- Metrics and dashboards around email activity
- Ability to block additional IOCS instead of just URL
- Ability to integrate with threat intelligence platforms
- What they label as a false positive is not always a false positive
Proofpoint - The Proof is There
- Attachment Defense. This component scans all attachments for malicious content, quarantining anything suspicious. This is a must have for any legitimate email protection product.
- URL Defense. With so many phishing attempts out there that try to lure the unsuspecting user into clicking a link to a malicious web site, URL Defense provide an invaluable safety net by encoding the URL and re-routing it to Proofpoint's "sandbox". If legitimate, it seamlessly redirects the user to the original URL. Despite your best efforts at education, a percentage of your end users will click the link. Knowing that TAP is sandboxing those links to test for malicious activity is protection we cannot live without.
- TAP Dashboard. This lets me see who's being targeted in my environment as well as provide metrics that tell me how effective the protection has been. We're able to identify our "VIP's" so that we can receive special alerets whey they come under attack.
- It's a stretch for me to find something that needs improvement. If I had to put at least one thing it would relate to URL Defense. The process works great but, there are times when you have to decode the encoded URL. Currently, the only place to do that is in the TAP dashboard. To save clicks and logins, it would be nice to have that decode functionality in the Proofpoint management console.
- No other issues.
- Post-detection of malicious web-based attacks
- Trending of types of attacks against our organization
- URL rewrite feature makes URLs very ugly and sometimes makes users more suspicious
Proofpoint Targeted Attack Protection, 2 Thumbs Up!
- URL rewriting, so clicks are protected from the start
- Attachment sandboxing, attachments are vetted for threats
- Integration with Proofpoint TRAP for auto-pull of messages
- Perhaps a bit more reporting would be beneficial
- TAP allows administrators and authorized users to effectively analyze threats and identify all targets.
- The tracking (did a user open an email, did they click a link and how many times) and analytics are a great asset to have for any IT admin.
- The ability to flag specific users as VIPs or important folks you want to keep an extra measure of attention on.
- Sometimes, it is difficult to determine what the threat did or the effect it had on the recipients. I think this is most difficult due to our inexperience, so I imagine this will be easier for us over time.
Email's Best Defense
- Block phishing sites when users click on malicious links in their emails
- Block malicious attachments
- Proofpoint Dynamic Reputation is its machine-learning to learn which IP addresses may be compromised to send spam (like part of a botnet) and block them
- The administration interface can be updated with improved navigation.
- Proofpoint does not recommend saving attachments in quarantine which creates an issue when there are false-positives. We cannot release a false-positive since it is not saved due to affecting performance of Proofpoint product when the database gets too big.
- It requires a good amount of time and effort to get familiar with Proofpoint system administration.
TAP protection helps users not get tapped by malicious links
- Re-evaluates web links on an on-going basis to see if the links were good and have been changed to bad.
- Identifies specific users and alerts us regarding who clicked the now bad links and were not blocked prior to discovery of malicious code.
- Gives us the ability to identify VIP users that may be especially vulnerable to attack and take additional action on them.
- Proofpoint needs to get a single sign-on for all the different portals.
A necessity most enterprises can't live without.
- The URL Defense components having greatly reduced the risk associated with "phishing" attacks and malicious web sites.
- The Attachment Defense components have also reduced the amount of malware (including zero day type attacks) actually getting to our clients systems.
- The services are fairly simple to implement and provide enough flexibility to tailor them to address specific security policies.
- The level of threat analysis is extremely high compared to some of Proofpoint's competitors making this a "goto" product for people who want a solid product to protect their enterprise. The on-going implementation has been extremely stable with minimal service outages.
- Accuracy is definitely one of Proofpoint's strong points and we have experienced very few false positives.
- The only real area that needs improvement is the customer specific definitions for blocked URL's in terms of providing more flexibility in using more specific pattern matching expressions. Pretty certain this will be resolved shortly.
- Cost is always a factor and given that this type of service is almost a necessity these days, their cost is a bit on the high end.
Proofpoint Targeted Attack Protection
- Identify whether an email was received or blocked by a user.
- Identify whether a malicious link in an email was clicked on or not.
- Listing of the severity of the campaign, as well as the spread (how many other customers were affected).
- Cloud integration ( in progress).
- Integrating the GUI with the Email Security Admin portal (instead of two different logins).
- It is great and alerting us to who has clicked on a URL that could be a problem.
- Also it prevents sophisticated files that would bypass traditional antivirus.
- URL writing is a great protection for our users.
- We have visibility who is hit by any malicious email campaign.
- Sometimes alerts are hard to read.
- Automatic removal of messages should be included in the product.
- It is costly...if it was part of the base product and all email gateway customers the cost should be lower. In the end a C level person doesn't care if a message was stopped (or allowed) because of a separate component.