Proofpoint at a glance
June 07, 2022
Proofpoint at a glance
Score 8 out of 10
Vetted Review
Verified User
Overall Satisfaction with Proofpoint Archiving and Compliance
We use Proofpoint primarily for email archiving for all users for the retention period of 6 years. Users are allowed to view their personal archives and we can also give access to other user archives for use cases such as an employee leaving our institution and their supervisor needing access to any ongoing email strings, including attachments. We also utilize Proofpoint's email and information protection. This includes an email firewall, allowing us to scan and allow or quarantine all emailing coming into our exchange server, and creating rules that limit what can be sent to and from our user emails. We also utilize Proofpoint's secure mail feature to encrypt all outgoing external emails. Lastly, we utilize Proofpoint's targeted attack protection as another line of defense with the email firewall to scan all incoming emails to quarantine and re-write malicious links and phishing attempts targeted at our users.
- Email archiving. Being able to access, on the fly, your entire email archive. Being able to filter by date, sender, attachment, etc. It can get really granular and is able to pull up records fast.
- Targeted Attack Protection for all incoming emails. Having the ability to automatically scan, quarantine, or re-write URLs within emails. Comparing incoming emails to potential phishing attempts already seen by other institutions.
- Email encryption & automatic encryption are based on certain rules set up on the firewall. e.g. automatically encrypt outgoing email if it has an attachment or contains a string of numbers that may be personal information.
- Email archiving is part of a hosted solution, meaning if something on Proofpoint's end goes down, it can lead to extended downtime. We've had times when our users were unable to access their archives for hours in a day. Proofpoint is good about communicating when outages occur though.
- Email archiving for set retention period
- Email encryption
- Email protection/firewall
- Targeted Attack Protection (TAP)
- Secure Share
- Although I cannot provide any concrete numbers for positive ROI. I can say with confidence that after implementing Proofpoint Archiving, there has never been a negative impact on our bottom line or any negative impact on our company as a whole. If anything there have been only positive outcomes where a user would need to recover a lost email, or if a user accidentally sends an email to an external party unencrypted, our firewall policies will automatically encrypt the email for them protecting us and the external customer. There are also countless times when an incoming email did contain malicious attachments or links where Proofpoint automatically re-wrote the links and protected our users from potential threats.
- Proofpoint Advanced Threat Protection, Proofpoint Email Protection and Proofpoint Targeted Attack Protection (TAP)
It's hard to compare Proofpoint archiving and compliance to the rest of these products because I personally feel like they all integrate so well with each other. Using them all simultaneously creates a completed puzzle for our company that gives our users the power and the protection they need to stay safe in a world where threats are always around every corner. I can easily recommend the four Proofpoint products above and they all work well together.
Do you think Proofpoint Intelligent Compliance delivers good value for the price?
Yes
Are you happy with Proofpoint Intelligent Compliance's feature set?
Yes
Did Proofpoint Intelligent Compliance live up to sales and marketing promises?
I wasn't involved with the selection/purchase process
Did implementation of Proofpoint Intelligent Compliance go as expected?
I wasn't involved with the implementation phase
Would you buy Proofpoint Intelligent Compliance again?
Yes