Overview
What is Proofpoint Targeted Attack Protection (TAP)?
Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and…
TrustRadius Insights
TAP in my own perspective as a user
Great product!
Spam/Phishing emails reduced significantly
Proofpoint TAP a product that just works!
TAP away those threats!
Proofpoint TAP is powerful but expensive
Email threat protection for loosely connected devices
Proofpoint Targeted Attack Review
Proofpoint is AWESOME!
Proofpoint TAP - Provides another layer to Email Security and is great at it.
Proofpoint Targeted Attack Protection - TAP'in out email threats
Proofpoint Targeted Attack Protection - it works pretty well!
Proofpoint Targeted Attack Protection: A Must For Any Organization's Email System
Proofpoint is at next level
Awards
Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards
Reviewer Pros & Cons
Pricing
What is Proofpoint Targeted Attack Protection (TAP)?
Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized…
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
13 people also want pricing
Alternatives Pricing
What is Avanan?
Avanan, from Check Point since the August 2021 acquisition, connects security technologies to enterprise cloud applications in order to improve protection of sensitive corporate data and IP. According to the vendor, Avanan's one-click deployment allows customers to deploy a new security solution in…
What is KnowBe4 PhishER/PhishER Plus?
PhishER is presented as a lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate threat response and manage the high volume of potentially malicious email messages reported by users. And, with automatic prioritization of emails, PhishER helps InfoSec and Security…
Product Details
- About
- Tech Details
What is Proofpoint Targeted Attack Protection (TAP)?
Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and credential-stealing phishing techniques to obtain sensitive information. TAP seamlessly integrates with the Proofpoint secure email gateway (Proofpoint Email Protection) to deliver best-in-class email security in a way that is cost effective and easy to use. TAP leverages the cloud to scale deployment, adapt analysis and protect people on any network or device.
With Proofpoint Targeted Attack Protection (TAP), you can:
- Provide sophisticated analysis to prevent threats from getting to a user's inbox.
- Detect known and unknown threats using adaptable analysis capabilities.
- Provide security teams detailed analysis and visibility about threats and threat campaigns.
- Provide visibility into threats targeting the Very Attacked People (VAP) in an organization.
Proofpoint Targeted Attack Protection (TAP) Features
- Supported: Provide sophisticated analysis to prevent threats from getting to users inbox.
- Supported: Detect known and unknown threats using adaptable analysis capabilities.
- Supported: Provide security teams detailed analysis and visibility about threats and threat campaigns.
- Supported: Provide visibility into threats targeting the Very Attacked People (VAP’s) in an organization
Proofpoint Targeted Attack Protection (TAP) Technical Details
Deployment Types | On-premise, Software as a Service (SaaS), Cloud, or Web-Based |
---|---|
Operating Systems | Windows, Linux, Mac |
Mobile Application | No |
Comparisons
Compare with
Reviews and Ratings
(65)Community Insights
- Pros
- Cons
Effective URL Blocking: Several users have praised Proofpoint TAP for its effective URL Blocking feature, which has prevented malicious URLs from infiltrating their systems. This feature not only alerts users about potential compromises but also provides concise threat context, enabling them to understand the nature of the threats they face.
Integration with Proofpoint TRAP: Many reviewers have valued the seamless integration between TAP and Proofpoint TRAP. By combining these two solutions, users are able to streamline their workflow and enhance security measures. The integration detects spam and phishing emails, providing an added layer of protection against cyber threats.
Accurate Attachment Detonation: Users have expressed high satisfaction with TAP's sandbox attachment detonation feature. This functionality effectively vets attachments for threats, allowing users to confidently analyze email attachments without risking system compromise. The ability to detect malicious attachments and boast a false positive rate of less than 0.001% over three years has been particularly impressive to reviewers.
Cumbersome Admin Web GUI: Users have mentioned that the admin web GUI is difficult to navigate and understand, leading to a steep learning curve. Several reviewers expressed frustration with the unclear interface and the need to constantly stay updated on new features.
Lack of Communication on New Features: Users have expressed frustration with Proofpoint's lack of communication when new features are added to their toolbox. Some users felt left in the dark about updates and wished for better transparency from the company.
Difficulty in Automating Custom Report Emails: Several users mentioned the inability to automate custom report emails like with Proofpoint Secure email. This inconvenience makes it time-consuming for administrators who rely on automated reports for efficient management.
Attribute Ratings
Reviews
(1-16 of 16)Proofpoint TAP a product that just works!
- Anti Spam
- Anti Malware
- Upgrades on the on-premise version can sometimes fail to install
Proofpoint TAP is powerful but expensive
- URL protection with a cloud-based Proofpoint database.
- Attachment analysis and removal of potentially dangerous content.
- Support for different languages in international environments for URL protection functions.
- Usability - The product is very easy to use, and begins giving a lot of valuable information immediately.
- Detail - The amount of detail for each threat is great, and helps us with "proving" there may be a problem somewhere.
- Defense - The URL rewrite function and sandbox function are great, and we saw immediate return from just those.
- Sandboxing can be slow at times, but that is understandable, but hard to explain to end users.
- URL rewrite takes time for the users to get used to the fact that every URL now looks "phishy".
Proofpoint is at next level
- We have been observing TAP is working well and also the integration with Palo Alto is working great.
- Having a very good experience with Proofpoint support and very super support from them. However we have not been notified of any new updates. Not sure, if these updates have already been sent to procurement team, but not the Allegis support group.
- We do see the TAP dashboard also has a URL for rewriting details and email alerts too, which will help us to identify the actual threats and also we can report them if the attack is a false positive as well.
- In the search pane, we could have more detailed information and which may useful while validating the incoming email for the engineers.
- I do agree no product is able to block any sort of new malware/phishing attacks, but I have been observing unless we are reporting it Proofpoint is unable to identify a threat in some cases (and after the virus engines have been updated). This could be improved.
- Also in few cases, the email might get blocked if we add the IP to our blacklist policy route. However there is no sign of email activity from that source. We should at least be able to see that info.
- Concise threat context
- URL rewriting
- I don't find the TAP portion of the product to be deficient. I think it's easy to use and is extremely helpful.
Ahead of its time!
- The best software for gaining better cyber awareness of your company!
- Intelligence like no other!
- Allows faster response and more efficient workflow!
- When an alert is made sometimes some information is lacking.
- Other than that, no complaints.
TAP for Protection
- Stopping attachments, bad URLs, and embedded malicious code.
- Sometimes there is a delay in detecting the threat, and by that time it has been delivered to a mailbox and the user may have clicked on a URL or opened an attachment.
- Added functionality is in separate add-on modules at a cost.
- TAP dashboard could be made easier to navigate to gather details of the threat.
Peace of mind at a reasonable price
- URL re-writing and sandboxing is very effective.
- Need to find a solution to e-mails with links to cloud-based documents with malicious payloads.
Easy to use and accurate threat detection
- Impostor email detection is a fantastic feature and works very well.
- The sandbox feature helps to ensure confidence that their evaluation of the email threat is valid.
- Easy to use (and understand) dashboard make identifying and managing email threats a breeze.
- Occasionally, we have a false positive or false negative, but those are easily corrected.
- Would like the ability to upload a file to have it automatically exploded via sandbox to determine threat.
TAP is a must with Proofpoint
- Alert on malware/attacks that made it through, so we can respond.
- Data loss prevention (DLP) is very flexible and accommodates our needs.
- More advancement in the imposter technology.
- Integration between Wombat (phishing campaign tool) and email.
Save your money and find something else
- Slowing down mail flow for scanning.
- Limiting to a specific sub group of your org.
- Sending lots of mail unthrottled by default.
- Stopping bad mail.
- Hashing spam emails in a more efficient way.
- Easy to manage.
- Easy to deploy.
- Proven solution.
- Adoption can be a problem, but only early on.
Proofpoint TAP Review
- Block malicious and phishing emails
- Alert of now known to be bad emails
- Threat intelligence for tracking campaigns
- Metrics and dashboards around email activity
- Ability to block additional IOCS instead of just URL
- Ability to integrate with threat intelligence platforms
- What they label as a false positive is not always a false positive
Proofpoint - The Proof is There
- Attachment Defense. This component scans all attachments for malicious content, quarantining anything suspicious. This is a must have for any legitimate email protection product.
- URL Defense. With so many phishing attempts out there that try to lure the unsuspecting user into clicking a link to a malicious web site, URL Defense provide an invaluable safety net by encoding the URL and re-routing it to Proofpoint's "sandbox". If legitimate, it seamlessly redirects the user to the original URL. Despite your best efforts at education, a percentage of your end users will click the link. Knowing that TAP is sandboxing those links to test for malicious activity is protection we cannot live without.
- TAP Dashboard. This lets me see who's being targeted in my environment as well as provide metrics that tell me how effective the protection has been. We're able to identify our "VIP's" so that we can receive special alerets whey they come under attack.
- It's a stretch for me to find something that needs improvement. If I had to put at least one thing it would relate to URL Defense. The process works great but, there are times when you have to decode the encoded URL. Currently, the only place to do that is in the TAP dashboard. To save clicks and logins, it would be nice to have that decode functionality in the Proofpoint management console.
- No other issues.
- Post-detection of malicious web-based attacks
- Trending of types of attacks against our organization
- URL rewrite feature makes URLs very ugly and sometimes makes users more suspicious
- TAP allows administrators and authorized users to effectively analyze threats and identify all targets.
- The tracking (did a user open an email, did they click a link and how many times) and analytics are a great asset to have for any IT admin.
- The ability to flag specific users as VIPs or important folks you want to keep an extra measure of attention on.
- Sometimes, it is difficult to determine what the threat did or the effect it had on the recipients. I think this is most difficult due to our inexperience, so I imagine this will be easier for us over time.