Skip to main content
TrustRadius
Proofpoint Targeted Attack Protection (TAP)

Proofpoint Targeted Attack Protection (TAP)

Overview

What is Proofpoint Targeted Attack Protection (TAP)?

Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and…

Read more
Recent Reviews

TrustRadius Insights

Effective URL Blocking: Several users have praised Proofpoint TAP for its effective URL Blocking feature, which has prevented malicious …
Continue reading

Great product!

10 out of 10
November 11, 2021
Incentivized
Currently, at my organization, Proofpoint Target Attack Protection, also known as TAP, is used by the SOC and also our Threat Intelligence …
Continue reading

Proofpoint is AWESOME!

10 out of 10
November 21, 2019
Incentivized
POD TAP is used for email protection. We greatly appreciate the added security and safe feeling it gives us. We are very happy with the …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Proofpoint Targeted Attack Protection (TAP)?

Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

13 people also want pricing

Alternatives Pricing

What is Avanan?

Avanan, from Check Point since the August 2021 acquisition, connects security technologies to enterprise cloud applications in order to improve protection of sensitive corporate data and IP. According to the vendor, Avanan's one-click deployment allows customers to deploy a new security solution in…

What is KnowBe4 PhishER?

PhishER is presented as a lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate threat response and manage the high volume of potentially malicious email messages reported by users. And, with automatic prioritization of emails, PhishER helps InfoSec and Security…

Return to navigation

Product Details

What is Proofpoint Targeted Attack Protection (TAP)?

Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and credential-stealing phishing techniques to obtain sensitive information. TAP seamlessly integrates with the Proofpoint secure email gateway (Proofpoint Email Protection) to deliver best-in-class email security in a way that is cost effective and easy to use. TAP leverages the cloud to scale deployment, adapt analysis and protect people on any network or device.

With Proofpoint Targeted Attack Protection (TAP), you can:

  • Provide sophisticated analysis to prevent threats from getting to a user's inbox.
  • Detect known and unknown threats using adaptable analysis capabilities.
  • Provide security teams detailed analysis and visibility about threats and threat campaigns.
  • Provide visibility into threats targeting the Very Attacked People (VAP) in an organization.

Proofpoint Targeted Attack Protection (TAP) Features

  • Supported: Provide sophisticated analysis to prevent threats from getting to users inbox.
  • Supported: Detect known and unknown threats using adaptable analysis capabilities.
  • Supported: Provide security teams detailed analysis and visibility about threats and threat campaigns.
  • Supported: Provide visibility into threats targeting the Very Attacked People (VAP’s) in an organization

Proofpoint Targeted Attack Protection (TAP) Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(65)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Effective URL Blocking: Several users have praised Proofpoint TAP for its effective URL Blocking feature, which has prevented malicious URLs from infiltrating their systems. This feature not only alerts users about potential compromises but also provides concise threat context, enabling them to understand the nature of the threats they face.

Integration with Proofpoint TRAP: Many reviewers have valued the seamless integration between TAP and Proofpoint TRAP. By combining these two solutions, users are able to streamline their workflow and enhance security measures. The integration detects spam and phishing emails, providing an added layer of protection against cyber threats.

Accurate Attachment Detonation: Users have expressed high satisfaction with TAP's sandbox attachment detonation feature. This functionality effectively vets attachments for threats, allowing users to confidently analyze email attachments without risking system compromise. The ability to detect malicious attachments and boast a false positive rate of less than 0.001% over three years has been particularly impressive to reviewers.

Cumbersome Admin Web GUI: Users have mentioned that the admin web GUI is difficult to navigate and understand, leading to a steep learning curve. Several reviewers expressed frustration with the unclear interface and the need to constantly stay updated on new features.

Lack of Communication on New Features: Users have expressed frustration with Proofpoint's lack of communication when new features are added to their toolbox. Some users felt left in the dark about updates and wished for better transparency from the company.

Difficulty in Automating Custom Report Emails: Several users mentioned the inability to automate custom report emails like with Proofpoint Secure email. This inconvenience makes it time-consuming for administrators who rely on automated reports for efficient management.

Attribute Ratings

Reviews

(1-25 of 42)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Like the level of details & the co-relation provided by the Proofpoint TAP services. The inbuilt sandboxing capability that is used to capture the behavior on visiting a suspicious link, capturing the current status of the remediation from Email Protection service & TRAP is an added advantage & speeds up the investigation.
The way TAP marks a particular threat identified in an email as False Positive from the sandbox outcome is great. Isolation browser is added advantage which helps to see real-time threat behavior.
Score 9 out of 10
Vetted Review
Verified User
Proofpoint TAP is well suited for big companies that have more than 5000 employees. Companies that are targeted every day by phishing attacks. It adds a layer of protection even if the employee is not well versed with phishing and recon, when the user clicked a malicious link, it will be blocked and the Security team will be alerted to mitigate depending on the scenario.
November 11, 2021

Great product!

Score 10 out of 10
Vetted Review
Verified User
Incentivized
I think it is well suited for any organization. It truly gives good insight on the email campaigns that are hitting your company, as well as the people that are being targeted the most and also VIP users such as executives or even other people in IT, cyber, or administrators.
Tim Slater | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint Targeted Attack Protection is an extremely robust solution to secure corporate email. It is extremely effective at eliminating anti-spam messages and allows users to manage a digest to access emails that may have been flagged as false positive. The product also is effective at blocking malware in messages. The user management interface is very intuitive and provides a robust medium to configure and administer the product very easily.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint TAP provides excellent protection for post weaponization of URL based phishing emails. Its ability to restore a URL and kick off the automation is especially helpful. Proofpoint's integration with other vendors also allows the organization to extend protection across the enterprise both for on-prem devices and loosely connected devices.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint TAP is well suited for enterprises that are being targeted by attackers sending traditional malicious email attachments and malicious URLs. Its lets suited for enterprises that are being targeted by attackers focused on sending emails without attachments or URLs to 'benign' websites that do not have exploits, but do attempt to convince the employee to log in and provide their username and password.
November 21, 2019

Proofpoint is AWESOME!

Score 10 out of 10
Vetted Review
Verified User
Incentivized
From inception to implementation, Proofpoint has been with us helping 100% of the way. We greatly appreciate the level of support and help during the transition and implementation process. It is very helpful to be able to pick up the phone or open a ticket via the web interface and know support will be available.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
I think that the dashboard is amazing and gives us insight into things that we have never "looked" into before. It gives us actionable items immediately and allows us to provide enough details to the correct teams to get things resolved in a timely and quick fashion.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
Some scenarios where Proofpoint Targeted Attack Protection for Email is well suited include: ability to identify threats targeting your organization and ability to correlate threats and threat actors.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We had a hard time with our previous product for email security (EOP), and Proofpoint is a very good replacement for EOP in terms of being more accurate in blocking attacks and in a few cases it wasn't able to perform as expected, but it is still fine.
October 22, 2019

Proofpoint just works

Jane Updegraff | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
This product is a good idea for any organization that finds themselves the target of malicious emails of any kind. Whether it be phishing, maleware, attachments with nefarious installers, etc, Proofpoint TAP catches nearly every single bogus URL and dangerous attachment by opening those items before our user can get to them. Proofpoint saves our users from themselves.
September 10, 2019

Ahead of its time!

Score 10 out of 10
Vetted Review
Verified User
Incentivized
Like I said earlier, TAP seamlessly integrates with your company and provides a great user experience. I would highly recommend it due to the fact that there is no other software like it that can compare!
August 29, 2019

TAP for Protection

Score 9 out of 10
Vetted Review
Verified User
Incentivized
Proofpoint Targeted Attack Protection for Email is well suited for any business to protect against all the threats that are so commonly coming in through emails. By isolating the email in the sandbox to analyze the contents, it protects us against information or credentials/integrity loss if a user were to click a link or open a malicious attachment.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
In general, the functionality provided by TAP is necessary in today's world of email threats. The users need this extra level of protection when so many emails have links and attachments in them. The odds of something nefarious being opened or clicked on is high so TAP is essential to have in place.
Fraser Clark | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
I think Proofpoint Targeted Attack Protection (TAP) is suited to larger organisations that can also afford to purchase Threat Response Auto-Pull (TRAP) from Proofpoint, as these work in tandem very, very well.
With smaller organisations, it could potentially provide a lot of work investigating things found within TAP rather than just having TRAP deal with the issues automatically.
Return to navigation