Overview
What is Proofpoint Targeted Attack Protection (TAP)?
Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and…
TrustRadius Insights
TAP in my own perspective as a user
Great product!
Spam/Phishing emails reduced significantly
Proofpoint TAP a product that just works!
TAP away those threats!
Proofpoint TAP is powerful but expensive
Email threat protection for loosely connected devices
Proofpoint Targeted Attack Review
Proofpoint is AWESOME!
Proofpoint TAP - Provides another layer to Email Security and is great at it.
Proofpoint Targeted Attack Protection - TAP'in out email threats
Proofpoint Targeted Attack Protection - it works pretty well!
Proofpoint Targeted Attack Protection: A Must For Any Organization's Email System
Proofpoint is at next level
Awards
Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards
Reviewer Pros & Cons
Pricing
What is Proofpoint Targeted Attack Protection (TAP)?
Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized…
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
13 people also want pricing
Alternatives Pricing
What is Avanan?
Avanan, from Check Point since the August 2021 acquisition, connects security technologies to enterprise cloud applications in order to improve protection of sensitive corporate data and IP. According to the vendor, Avanan's one-click deployment allows customers to deploy a new security solution in…
What is KnowBe4 PhishER?
PhishER is presented as a lightweight Security Orchestration, Automation and Response (SOAR) platform to orchestrate threat response and manage the high volume of potentially malicious email messages reported by users. And, with automatic prioritization of emails, PhishER helps InfoSec and Security…
Product Details
- About
- Tech Details
What is Proofpoint Targeted Attack Protection (TAP)?
Proofpoint Targeted Attack Protection (TAP) helps organizations efficiently detect, mitigate and respond to known and unknown advanced threats that target people and VIPs through email. TAP provides unparalleled effectiveness in stopping targeted attacks that use polymorphic malware, weaponized documents and credential-stealing phishing techniques to obtain sensitive information. TAP seamlessly integrates with the Proofpoint secure email gateway (Proofpoint Email Protection) to deliver best-in-class email security in a way that is cost effective and easy to use. TAP leverages the cloud to scale deployment, adapt analysis and protect people on any network or device.
With Proofpoint Targeted Attack Protection (TAP), you can:
- Provide sophisticated analysis to prevent threats from getting to a user's inbox.
- Detect known and unknown threats using adaptable analysis capabilities.
- Provide security teams detailed analysis and visibility about threats and threat campaigns.
- Provide visibility into threats targeting the Very Attacked People (VAP) in an organization.
Proofpoint Targeted Attack Protection (TAP) Features
- Supported: Provide sophisticated analysis to prevent threats from getting to users inbox.
- Supported: Detect known and unknown threats using adaptable analysis capabilities.
- Supported: Provide security teams detailed analysis and visibility about threats and threat campaigns.
- Supported: Provide visibility into threats targeting the Very Attacked People (VAP’s) in an organization
Proofpoint Targeted Attack Protection (TAP) Technical Details
Deployment Types | On-premise, Software as a Service (SaaS), Cloud, or Web-Based |
---|---|
Operating Systems | Windows, Linux, Mac |
Mobile Application | No |
Comparisons
Compare with
Reviews and Ratings
(65)Community Insights
- Pros
- Cons
Effective URL Blocking: Several users have praised Proofpoint TAP for its effective URL Blocking feature, which has prevented malicious URLs from infiltrating their systems. This feature not only alerts users about potential compromises but also provides concise threat context, enabling them to understand the nature of the threats they face.
Integration with Proofpoint TRAP: Many reviewers have valued the seamless integration between TAP and Proofpoint TRAP. By combining these two solutions, users are able to streamline their workflow and enhance security measures. The integration detects spam and phishing emails, providing an added layer of protection against cyber threats.
Accurate Attachment Detonation: Users have expressed high satisfaction with TAP's sandbox attachment detonation feature. This functionality effectively vets attachments for threats, allowing users to confidently analyze email attachments without risking system compromise. The ability to detect malicious attachments and boast a false positive rate of less than 0.001% over three years has been particularly impressive to reviewers.
Cumbersome Admin Web GUI: Users have mentioned that the admin web GUI is difficult to navigate and understand, leading to a steep learning curve. Several reviewers expressed frustration with the unclear interface and the need to constantly stay updated on new features.
Lack of Communication on New Features: Users have expressed frustration with Proofpoint's lack of communication when new features are added to their toolbox. Some users felt left in the dark about updates and wished for better transparency from the company.
Difficulty in Automating Custom Report Emails: Several users mentioned the inability to automate custom report emails like with Proofpoint Secure email. This inconvenience makes it time-consuming for administrators who rely on automated reports for efficient management.
Attribute Ratings
Reviews
(1-25 of 42)Proofpoint TAP - Critical for Email Security
Threat description in sandbox is very helpful for further triaging.
Isolation browser is another good feature which allows you to browse malicious website without risk of infection.