Proofpoint Targeted Attack Protection (TAP)
Overview
What is Proofpoint Targeted Attack Protection (TAP)?
Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and...
Recent Reviews
Awards
Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards
Video Reviews
Leaving a video review helps other professionals like you evaluate products. Be the first one in your network to record a review of Proofpoint Targeted Attack Protection (TAP), and make your voice heard!
Pricing
View all pricingEntry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting / Integration Services
Would you like us to let the vendor know that you want pricing?
Alternatives Pricing
Product Details
- About
- Tech Details
What is Proofpoint Targeted Attack Protection (TAP)?
Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and credential-stealing phishing techniques to obtain sensitive information. TAP seamlessly integrates with the Proofpoint secure email gateway (Proofpoint Email Protection) to deliver best-in-class email security in a way that is cost effective and easy to use. TAP leverages the cloud to scale deployment, adapt analysis and protect people on any network or device.
With Proofpoint Targeted Attack Protection (TAP), you can:
- Provide sophisticated analysis to prevent threats from getting to a user's inbox.
- Detect known and unknown threats using adaptable analysis capabilities.
- Provide security teams detailed analysis and visibility about threats and threat campaigns.
- Provide visibility into threats targeting the Very Attacked People (VAP) in an organization.
Proofpoint Targeted Attack Protection (TAP) Features
- Supported: Provide sophisticated analysis to prevent threats from getting to users inbox.
- Supported: Detect known and unknown threats using adaptable analysis capabilities.
- Supported: Provide security teams detailed analysis and visibility about threats and threat campaigns.
- Supported: Provide visibility into threats targeting the Very Attacked People (VAP’s) in an organization
Proofpoint Targeted Attack Protection (TAP) Technical Details
Deployment Types | On-premise, Software as a Service (SaaS), Cloud, or Web-Based |
---|---|
Operating Systems | Windows, Linux, Mac |
Mobile Application | No |
Comparisons
View all alternativesCompare with
Proofpoint Email Protection
Microsoft Exchange
Trellix Endpoint Security
Mimecast Secure Email Gateway
Cisco Secure Email
Palo Alto Networks Advanced URL Filtering
BrandShield Anti-Phishing
Symantec Email Threat Detection and Response
Proofpoint Essentials
Cofense Managed PDR
Reviews and Ratings
Attribute Ratings
Reviews
(1-25 of 41)- Popular Filters
TAP in my own perspective as a user
- Rewrite URL
- Blocked malicious URL
- Reporting
- Alerted for possible compromise
- Reduce false positive for impostor alerts
- I have noticed that if the URL is long, sometimes it's not being rewritten so the layer of protection is not there
- More proactive approach rather reactive to avoid possible compromise
Great product!
- Details on specific malicious email campaigns
- Details on the users that are targeted by those campaigns
- Use of API's to be used with other cyber tools your company has
- Insight on the types of malware and types of campaigns
- Better user import capabilities
- MITRE alignment
- Stronger campaign capture
Spam/Phishing emails reduced significantly
- Spam/phishing protection
- Sandbox attachment detonation
- Better reporting
- Screenshot of emails
Proofpoint TAP a product that just works!
- Anti Spam
- Anti Malware
- Upgrades on the on-premise version can sometimes fail to install
TAP away those threats!
- URL rewrite feature is extremely useful for finding users at risk
- Very attacked people is great for end user awareness targeted training
- The dashboard is very intuitive and has useful data for reporting efficacy
- Small issue but it would be great if they got on board with SAML 2.0 authentication for the dashboard
- Would be nice to combine PPS and TAP dashboards into one view for reporting
Proofpoint TAP is powerful but expensive
- URL protection with a cloud-based Proofpoint database.
- Attachment analysis and removal of potentially dangerous content.
- Support for different languages in international environments for URL protection functions.
Email threat protection for loosely connected devices
- Detecting post-delivery weaponization of URLs.
- Attachment inspection and detection.
- Email retrieval once an incident is detected.
- Select the treatment of VIP users that allows for enhanced protection.
- Proofpoint TAP provides great insight into attack campaigns.
- It allows for faster response to zero-day attacks.
- User-interface could use improvement.
- Better details on detonation information emails from my own organization. Show me exactly what email and path from the sandbox.
Proofpoint Targeted Attack Review
- Proofpoint TAP does a good job of tracking malicious campaigns and providing a portal where my team can confirm which employees were targeted by each campaign.
- Proofpoint TAP does a good job of detecting malicious attachments.
- Proofpoint TAP does a good job of continually updating its threat intelligence so if we were targeted early in a campaign before it had been detected it will send us a notification if there is a match between emails we have already received that threat intelligence now classifies as malicious.
- While Proofpoint TAP does perform URL protection it has room for improvement on how it detects URLs going to credential-stealing websites. Our employees report emails with credential-stealing URLs on a daily basis that were not blocked by Proofpoint TAP.
- While Proofpoint TAP does provide basic reports of files it analyzes, the reports do not provide enough information to understand what the malicious file activity was. in contrast, publicly available sandboxes provide that information for free.
- While Proofpoint TAP does provide a dashboard that allows us to view the emails associated with threat campaigns, the dashboard views and reports have significant limitations on the timeframe we can search by. Some of the dashboards/views/reports are limited to 14 days. We need to report findings based on monthly and quarterly trends which are not possible with the current timeframe limitations.
Proofpoint is AWESOME!
- It keeps us secure.
- It prevents possible hacks.
- It makes us feel more secure.
- The product has covered all of our needs. There is really no room for improvement other than that I wish that the training was on the specific version of the product we are on.
- Usability - The product is very easy to use, and begins giving a lot of valuable information immediately.
- Detail - The amount of detail for each threat is great, and helps us with "proving" there may be a problem somewhere.
- Defense - The URL rewrite function and sandbox function are great, and we saw immediate return from just those.
- Sandboxing can be slow at times, but that is understandable, but hard to explain to end users.
- URL rewrite takes time for the users to get used to the fact that every URL now looks "phishy".
Proofpoint Targeted Attack Protection - TAP'in out email threats
- Identify malware
- Identify targeted employees
- Provide details of threats targeting recipients
- Ability to correlate threat actors with my organization's listing of threat actors
- Whitelist sources of safe senders
- Reporting on VIP-targeted threats
Proofpoint Targeted Attack Protection - it works pretty well!
- Messages with malicious URLs are blocked/quarantined and kept out of end-users mailboxes
- Sometimes you'll get a TAP warning that messages with malicious content were already delivered to users mailboxes BEFORE the Proofpoint algorithm detected them as malicious.
- Proofpoint Targeted Attack Protection detects malicious attachments very well.
- In three years of use we had less then a 0.001% false positive rate with the product.
- When the product experiences technical issues your team will have to manually review attachments for malicious threats.
- The scanning process delays email messages with attachments between 3-5 minutes during scanning.
Proofpoint is at next level
- We have been observing TAP is working well and also the integration with Palo Alto is working great.
- Having a very good experience with Proofpoint support and very super support from them. However we have not been notified of any new updates. Not sure, if these updates have already been sent to procurement team, but not the Allegis support group.
- We do see the TAP dashboard also has a URL for rewriting details and email alerts too, which will help us to identify the actual threats and also we can report them if the attack is a false positive as well.
- In the search pane, we could have more detailed information and which may useful while validating the incoming email for the engineers.
- I do agree no product is able to block any sort of new malware/phishing attacks, but I have been observing unless we are reporting it Proofpoint is unable to identify a threat in some cases (and after the virus engines have been updated). This could be improved.
- Also in few cases, the email might get blocked if we add the IP to our blacklist policy route. However there is no sign of email activity from that source. We should at least be able to see that info.
- Concise threat context
- URL rewriting
- I don't find the TAP portion of the product to be deficient. I think it's easy to use and is extremely helpful.
Proofpoint just works
- Rewrites URLs in all our emails and very rarely misses one
- it works very well to protect our users from themselves and their bad habits
- Their admin web GUI is cumbersome and unclear in many ways. The learning curve is steep so you have to stay up on things yourself whenever a new feature or service is added.
- They sometimes add a feature to their toolbox without informing their customers. This is true even when the feature added does not cost extra.
TAP has saved us multiple times against post malware threats.
- We receive email TAP alerts when malicious email gets past the Proofpoint Secure Email product.
- TAP provides very a detailed analysis of the any email malware that potentially reaches our end users.
- The overall reporting from TAP is very beneficial, especially the way it will compare our organization to similar organizations.
- I have not found a way to automate emailing me custom reports like I can do with Proofpoint Secure email.
- Sometimes you have to click through multiple links to get to the details of a malware email.
Ahead of its time!
- The best software for gaining better cyber awareness of your company!
- Intelligence like no other!
- Allows faster response and more efficient workflow!
- When an alert is made sometimes some information is lacking.
- Other than that, no complaints.
Proofpoint TAP will solve your phishing crisis
- Plug and play with little effort.
- Blocks a majority of malicious email.
- URL re-write allows links that may have slipped through to be analyzed in real-time.
- Improved analytics could improve automated blocking features and lead to fewer patient zero cases.
TAP for Protection
- Stopping attachments, bad URLs, and embedded malicious code.
- Sometimes there is a delay in detecting the threat, and by that time it has been delivered to a mailbox and the user may have clicked on a URL or opened an attachment.
- Added functionality is in separate add-on modules at a cost.
- TAP dashboard could be made easier to navigate to gather details of the threat.
Couldn't survive without it!
- URL defense.
- Safe attachments.
- Detection and incident response.
- The administrative user interface could be a bit more intuitive.
- Notifications are still somewhat cryptic when an event is identified.
- This feature is a separate cost from standard email protection.
- URL rewriting. TAP can rewrite URLs to obfuscate potentially harmful links. And if it is harmful, then we can see this in the dashboard and respond appropriately.
- Attachment defense is particularly impressive. We see 99% of attachments which are potentially malicious being blocked.
- Reporting. The reporting in TAP is fantastic and provides great insight into our organisation. It's the sort of reports the senior management are interested in.
- The dashboard can be a bit tricky to understand. There is a lot of info, and it can be confusing at first to figure out what certain phrases mean.
- Drilling down into attack dashboards, I would expect some items to be clickable to get more info. But they are not which means I have to search around for the information I want.
- Again, the effectiveness dashboard does not have a lot of clickable elements, but they look like they should be which is frustrating.
Peace of mind at a reasonable price
- URL re-writing and sandboxing is very effective.
- Need to find a solution to e-mails with links to cloud-based documents with malicious payloads.
TAP Review
- Blocks malicious emails.
- Detects ransomware.
- Rewrites URLs.
- Better logging solutions.
Happy with Proofpoint TAP.
- Finding threats.
- Reporting.
- Insight into the threats (sandbox results).
- Solve the bug with the TRAP integration.
- Have consistent look & feel with the other Proofpoint products.