Ensign ProofPoint Review
August 12, 2019

Ensign ProofPoint Review

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Proofpoint Email Protection

We use ProofPoint to monitor and protect our inbound public emails and our outbound messages, monitoring for DLP, and other patient info. The product has been very reliable in the 6 years I have used the product. We are currently protecting over 10,000 mailboxes with a suite of ProofPoint tools, including TAPs and TRAPs. TAP has done a great job removing almost all traces of virus' getting through to our users, where we would be hit with multiple ransomware attacks in a months time to none since enrolling in the product. TRAP has also been a big help in reducing our phishing attacks. TRAP has made recalling suspect emails very easy and tracking when users click on suspect messages very simple. We get very detailed reporting and status reports of our users and that also helps us take action and preventative measures. The product suite has grown over my time as a customer and when I am asked online or by a fellow professional, I always recommend Proofpoint for email protection. My only complaint as a customer has been support response and that is only recently with the last couple support cases I have opened.
  • We receive very few incidents of SPAM in our user mailboxes. Looking at reports, you can see the service is doing its job.
  • Coming up with innovative products, like TAP. This was a great addition to really clamp down on suspect attachments.
  • MY only gripe is response time to incident requests.
  • After adding the TAP product, we eliminated our ransomware incidents. This has eliminated the need for IT to tackle these incidents, restoring data and working with users to restore their lost work.
I can't speak to this as I have never used another email gateway service.
The product works for us, we have a large email footprint and it does a great job.

Proofpoint Email Protection Feature Ratings

Anti-malware
9
Customizability
9
Data Loss Protection
9
Threat Detection
9
Sandboxing
10
End-to-End Encryption
9
Management Tools
8