TrustRadius: an HG Insights company

Proofpoint Targeted Attack Protection (TAP)

Score9.1 out of 10

65 Reviews and Ratings

What is Proofpoint Targeted Attack Protection (TAP)?

Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and credential-stealing phishing techniques to obtain sensitive information. TAP seamlessly integrates with the Proofpoint secure email gateway (Proofpoint Email Protection) to deliver best-in-class email security in a way that is cost effective and easy to use. TAP leverages the cloud to scale deployment, adapt analysis and protect people on any network or device.

With Proofpoint Targeted Attack Protection (TAP), you can:

  • Provide sophisticated analysis to prevent threats from getting to a user's inbox.
  • Detect known and unknown threats using adaptable analysis capabilities.
  • Provide security teams detailed analysis and visibility about threats and threat campaigns.
  • Provide visibility into threats targeting the Very Attacked People (VAP) in an organization.

Categories & Use Cases

The Ultimate Guardian for Your Email Security.

Use Cases and Deployment Scope

We currently utilize Proofpoint Targeted Attack Protection to safeguard our users from inadvertently clicking on malicious phishing links. This advanced security solution not only prevents potential threats but also assists us in conducting thorough investigations whenever users fall victim to phishing attempts, ensuring a comprehensive approach to our cybersecurity operations.

Pros

  • Notifying of malicious clicks.
  • Click rate metrics.
  • Historical searches on user's and their clicks.

Cons

  • Submitting false positives.
  • Submitting false negatives.
  • Better integrations with other tools.

Return on Investment

  • Helped our team be proactive with phishing threats.
  • Helped us respond to click events swiftly.
  • It has sometimes missed attacks.
  • Identifying clicks when the recipient is on a distribution list is not very accurate.

Usability

Alternatives Considered

Abnormal Security

Other Software Used

Abnormal Security, CrowdStrike Falcon, Proofpoint Email Protection

TAP away those threats!

Pros

  • URL rewrite feature is extremely useful for finding users at risk
  • Very attacked people is great for end user awareness targeted training
  • The dashboard is very intuitive and has useful data for reporting efficacy

Cons

  • Small issue but it would be great if they got on board with SAML 2.0 authentication for the dashboard
  • Would be nice to combine PPS and TAP dashboards into one view for reporting

Return on Investment

  • The URL rewrite feature saves incident responders from digging into other tools to find if they are at risk. Easily saves 15-20 minutes of time per incident.

Alternatives Considered

Mimecast Secure Email Gateway

Usability

Proofpoint TAP a product that just works!

Pros

  • Anti Spam
  • Anti Malware

Cons

  • Upgrades on the on-premise version can sometimes fail to install

Return on Investment

  • Proofpoint has been our organizations anti-spam solution for many years with great results

Other Software Used

Extreme Ethernet Switches

Usability

Proofpoint TAP - Critical for Email Security

Use Cases and Deployment Scope

Proofpoint Targeted Attack Protection (TAP) is very helpful in detecting threats that come through mail. It keeps track of URL accessed by user in mail which is deemed suspicious after delivery of it.

Threat description in sandbox is very helpful for further triaging.

Isolation browser is another good feature which allows you to browse malicious website without risk of infection.

Pros

  • Sandboxing of threat
  • Description of rewritten & non-rewritten helps in triaging
  • Isolation browser
  • Threat description & tagging

Cons

  • Detailed description of threat
  • Mail quarantine option should be introduced like in TRAP
  • Reduce false positive for impostor alerts & URL defence
  • Need to focus on integration of TAP with other EDR relation technologies

Return on Investment

  • Provide sophisticated analysis to prevent threats from getting to users inbox.
  • Isolation browser
  • They should focus on preventing FPs which sometimes blocks legit mails
  • Should introduce more feature for threat hunting

Alternatives Considered

Trend Micro Email Security

Proofpoint just works

Pros

  • Rewrites URLs in all our emails and very rarely misses one
  • it works very well to protect our users from themselves and their bad habits

Cons

  • Their admin web GUI is cumbersome and unclear in many ways. The learning curve is steep so you have to stay up on things yourself whenever a new feature or service is added.
  • They sometimes add a feature to their toolbox without informing their customers. This is true even when the feature added does not cost extra.

Return on Investment

  • Proopoint has allowed my department to spend a lot less time mitigating the after-effects of all kinds of malicious emails, so that's a big time and money savings

Alternatives Considered

Mimecast Secure Email Gateway

Other Software Used

VMware ESXi, Cisco Unified Communications Manager (Call Manager), Cherwell Service Management