Proofpoint Email Protection review
August 14, 2019

Proofpoint Email Protection review

Anonymous | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Proofpoint Email Protection

We currently use Proofpoint Email Protection across our whole organization to filter out spam, bulk, viruses and unwanted email from ever getting to our end users.
  • Proofpoint Dynamic Reputation works really well for us. Approximately 82% of all of our inbound emails are blocked by Proofpoint.
  • We can customize setting to allow it to work for us by allowing or blocking emails based on all types of criteria.
  • We do not allow our end users to report SPAM so admins report SPAM and can also blacklist certain emails.
  • We use Threat Response Auto Pull (TRAP) and a lot of the malicious emails are actually pulled from the user's mailbox before they ever know that they received them.
  • When reporting SPAM the default page settings are always loaded. I would like to be able to customize the startup screen for the folder that it starts in and the length of days to search for.
  • Not all emails show up in the quarantine if they are below a certain size. We have emails that end-users request to be reported as SPAM but we are unable to in the user admin.
  • We have to go between quarantine and Smart Search quite a bit when researching emails. Maybe this information could be combined in one screen.
  • We utilize it daily for blocking emails.
  • It helps our end users by encrypting emails based on policies we have customized.
We have been using Proofpoint Email Protection so long that I can't actually remember what we used before. It is highly rated on the Gartner scale and we have not evaluated other products because Proofpoint Email Protection does what it is supposed to.
We have been using Proofpoint Email Protection for several years. I would not want to manage our email/computers without it.

Proofpoint Email Protection Feature Ratings

Anti-malware
8
Customizability
8
Data Loss Protection
5
Threat Detection
5
Sandboxing
6
End-to-End Encryption
6
Management Tools
7