Skip to main content
TrustRadius
Proofpoint Targeted Attack Protection (TAP)

Proofpoint Targeted Attack Protection (TAP)

Overview

What is Proofpoint Targeted Attack Protection (TAP)?

Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and…

Read more
Recent Reviews

TrustRadius Insights

Effective URL Blocking: Several users have praised Proofpoint TAP for its effective URL Blocking feature, which has prevented malicious …
Continue reading

Great product!

10 out of 10
November 11, 2021
Incentivized
Currently, at my organization, Proofpoint Target Attack Protection, also known as TAP, is used by the SOC and also our Threat Intelligence …
Continue reading

Proofpoint is AWESOME!

10 out of 10
November 21, 2019
Incentivized
POD TAP is used for email protection. We greatly appreciate the added security and safe feeling it gives us. We are very happy with the …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Proofpoint Targeted Attack Protection (TAP)?

Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

13 people also want pricing

Alternatives Pricing

What is Avanan?

Avanan, from Check Point since the August 2021 acquisition, connects security technologies to enterprise cloud applications in order to improve protection of sensitive corporate data and IP. According to the vendor, Avanan's one-click deployment allows customers to deploy a new security solution in…

What is KnowBe4 PhishER?

PhishER is presented as a lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate threat response and manage the high volume of potentially malicious email messages reported by users. And, with automatic prioritization of emails, PhishER helps InfoSec and Security…

Return to navigation

Product Details

What is Proofpoint Targeted Attack Protection (TAP)?

Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and credential-stealing phishing techniques to obtain sensitive information. TAP seamlessly integrates with the Proofpoint secure email gateway (Proofpoint Email Protection) to deliver best-in-class email security in a way that is cost effective and easy to use. TAP leverages the cloud to scale deployment, adapt analysis and protect people on any network or device.

With Proofpoint Targeted Attack Protection (TAP), you can:

  • Provide sophisticated analysis to prevent threats from getting to a user's inbox.
  • Detect known and unknown threats using adaptable analysis capabilities.
  • Provide security teams detailed analysis and visibility about threats and threat campaigns.
  • Provide visibility into threats targeting the Very Attacked People (VAP) in an organization.

Proofpoint Targeted Attack Protection (TAP) Features

  • Supported: Provide sophisticated analysis to prevent threats from getting to users inbox.
  • Supported: Detect known and unknown threats using adaptable analysis capabilities.
  • Supported: Provide security teams detailed analysis and visibility about threats and threat campaigns.
  • Supported: Provide visibility into threats targeting the Very Attacked People (VAP’s) in an organization

Proofpoint Targeted Attack Protection (TAP) Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(65)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Effective URL Blocking: Several users have praised Proofpoint TAP for its effective URL Blocking feature, which has prevented malicious URLs from infiltrating their systems. This feature not only alerts users about potential compromises but also provides concise threat context, enabling them to understand the nature of the threats they face.

Integration with Proofpoint TRAP: Many reviewers have valued the seamless integration between TAP and Proofpoint TRAP. By combining these two solutions, users are able to streamline their workflow and enhance security measures. The integration detects spam and phishing emails, providing an added layer of protection against cyber threats.

Accurate Attachment Detonation: Users have expressed high satisfaction with TAP's sandbox attachment detonation feature. This functionality effectively vets attachments for threats, allowing users to confidently analyze email attachments without risking system compromise. The ability to detect malicious attachments and boast a false positive rate of less than 0.001% over three years has been particularly impressive to reviewers.

Cumbersome Admin Web GUI: Users have mentioned that the admin web GUI is difficult to navigate and understand, leading to a steep learning curve. Several reviewers expressed frustration with the unclear interface and the need to constantly stay updated on new features.

Lack of Communication on New Features: Users have expressed frustration with Proofpoint's lack of communication when new features are added to their toolbox. Some users felt left in the dark about updates and wished for better transparency from the company.

Difficulty in Automating Custom Report Emails: Several users mentioned the inability to automate custom report emails like with Proofpoint Secure email. This inconvenience makes it time-consuming for administrators who rely on automated reports for efficient management.

Attribute Ratings

Reviews

(1-25 of 35)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint has more insight on threats on threat dashboard.

It has good details about correlation of threat with your environment.

The inbuilt sandboxing capability that is used to capture the behavior on visiting a suspicious link, capturing the current status of the remediation are good.
It tracks threat delivered to user based on file, URL & share mail details which helps in quick remediation.





Score 9 out of 10
Vetted Review
Verified User
Proofpoint TRAP has already proven that their product is reliable and also the innovation that they provided for the business. TAP is very reliable when it comes to alerting and blocking malicious URLs/Attachment/. This product plus the Email Protection are both very effective in preventing targeted phishing attacks and avoiding compromised accounts.
November 11, 2021

Great product!

Score 10 out of 10
Vetted Review
Verified User
Incentivized
This is the first product of its kind that I've used personally. The last 3 companies that I worked for also used Proofpoint, which includes Proofpoint Targeted Attack Protection, so I don't have a way to really compare it. I have seen that it is a leader in the industry.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
I have used Cisco IronPort in the past and there is no comparison to the protection that Proofpoint TAP provides. With systems that are not on-prem and other corporate-owned devices, like cell phones and iPad's, corporate-owned anti-x controls are not always able to maintain currently updated signatures. With TAP our loosely connected devices are always protected from email threats.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
We selected Proofpoint TAP as part of the email security solution we were planning to deploy. We did not do an active bake off between specific features, like Proofpoint TAP, when we were evaluating different vendors.
November 21, 2019

Proofpoint is AWESOME!

Score 10 out of 10
Vetted Review
Verified User
Incentivized
We don't use any other products, but this one is the best by far, and the support is amazing as well! We have enjoyed the interaction and the support and the implementation walkthrough as well. If you're not with Proofpoint, you need to consider it! What a great product!
Score 7 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint does a great job of identifying threats used in email and because it is integrated with other Proofpoint services subscribed to, it provides a holistic picture of email security for my organization.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We used EOP (Exchange Online Protection) earlier and we had a POC on Proofpoint which we have been excited to use and the results are positive.

Before Proofpoint, we had many issues with impostors. We were having hard time to get EOP (Microsoft) to proactively blok any of the known threats and until we reported it, EOP was unable to stop them and our experience was always reactive.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint exceeds both in overall effectiveness. I found Barracuda to be easier to manage at times, but Proofpoint was more "customizable" to fit my needs.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
I was not involved in the original evaluation or purchase decision for the Proofpoint Targeted Attack Protection. Despite that fact, I feel confident that we have made the correct decision with our purchase of Proofpoint Targeted Attack Protection.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Feature-wise identical. Mimecast was very affordable compared to Proofpoint. We were able to get annual costs with Proofpoint down to a more acceptable level. Also, the migration costs for us (due to deep customization) was more effort for little return (after PP price was lowered).
Score 1 out of 10
Vetted Review
Verified User
Incentivized
It is terrible, especially for the cost. If I am going to pay for a Lamborghini I expect performance. If my cheap GEO Metro can go just as fast while also saving me lots of money, why drive the Lambo?
Return to navigation